Thanks, everyone, for the user- vs kernel-land info.  As soon as I read
it, I got it.  Disappointed but I got it.

ipsec/isakpmd is, I think, kernel-land and it has some very flexible
(per ipsec rule, not just daemon level, as in user or group filtering)
pf+visible tag capabilities.

As he crosses his fingers and starts the please-please-please dance  ...
Respecting the differences between sshd and ipsec implementations and,
now that I get it, their respective run space, it certainly would be
nice to see as a "futures" sshd inherit what ever may be inheritable in
these regards. 

This ssh -w option is sooo very cool!!!  It just needs a little more
something from the supporting cast of daemons.

Thx.



-----Original Message-----
From: Giancarlo Razzolini <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: misc@openbsd.org
Subject: Re: pf tag goes missing post sshd tcp decapsulization
Date: Mon, 03 Mar 2008 13:02:02 -0300
Mailer: Thunderbird 1.5.0.14pre (X11/20071023)
Delivered-To: [EMAIL PROTECTED]

Henning Brauer escreveu:
> * Giancarlo Razzolini <[EMAIL PROTECTED]> [2008-03-03 14:35]:
>> Tags are only visible while in the kernel. Once you send them to a
>> application, unless it has the ability to set a tag, the tag will be
>> lost. The ftp-proxy(8) AFAICR, since 4.1 has the ability to set a tag on
>> the packet. It would be nice if more userland applications like sshd,
>> spamd, hoststated, etc, could set tags too.
>
> actually, it is not ftp-proxy that sets tags. ftp-proxy dynamically
> inserts rules and makes THEM tag the packets. that concept doesn't
> translate all that well to the other usage cases you mention.
>
And, as the packets passes by the rules that ftp-proxy inserted, they
can be filtered on using the tag inserted with ftp-proxy. But it would
be really nice to have other applications being able to "see" tags and
set them too in the packets passing through them. But i don't see it
much as a limitation. I do use the user keyword or other means to filter
based on the application. Also, a very good thing is the ability to use
the authpf. I also think that the new chroot functionally off ssh that
is shipping with open 4.3, will help on doing this.

My regards,
--
Giancarlo Razzolini
Linux User 172199
Red Hat Certified Engineer no:804006389722501
Moleque Sem Conteudo Numero #002
Slackware Current
OpenBSD Stable
Ubuntu 7.04 Feisty Fawn
Snike Tecnologia em Informatica
4386 2A6F FFD4 4D5F 5842  6EA0 7ABE BBAB 9C0E 6B85

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]

Reply via email to