> Richard L. Hamilton wrote:
> > Does Trusted Extensions have any helpful
> capabilities to avoid
> > trojans/spoofing, ensure the visual representation
> of labels (or other
> > security status indicators) can't be faked, assure
> that programs that
> > need it can be ensured exclusive access to
> keypress/keyrelease events,
> > etc?  Could some of those capabilities be used
> independently of the rest
> > of Trusted Extensions, enough to deal with the
> problem of prompting for
> > account passwords safely?
> >   
> Yes, Trusted Extensions provides continuous feedback
> in a reserved 
> stripe which cannot be obscured. It displays a shield
> when the focus is 
> associated with the Trusted Path, and an unspoofable
> label.
> 
> It also enforces user, role, and label separation of
> X resources in the 
> X server. So clients with different labels or uids
> can't spy on each 
> other. Trusted Path clients run in the global zone
> which is not 
> available to users, so they can't interfere with it.
> Authentication is 
> done via the Trusted Path, as is label assignment.
> Event handling is 
> similarly restricted by preventing untrusted clients
> from expressing 
> interest on trusted clients, and by disallowing
> access to the state of 
> the keyboard, motion events, etc.
> 
> Now that TX is bundled with OpenSolaris, anyone can
> take advantage of 
> these features. However, be careful of what you mean
> by using them 
> independently. Independent of what? Labels? Zones?
> Why not just use it 
> as it is?

Yes, labels and zones is mainly what I meant.  MLS is
great if you need it, but administrative overhead and
usage inconvenience if you don't.  And AFAIK if TX as a
whole is used, it precludes other unrelated use of zones
on that system.
 
 
This message posted from opensolaris.org

Reply via email to