On Fri, 7 Mar 2008, Henning Brauer wrote:

>* Dave Anderson <[EMAIL PROTECTED]> [2008-03-07 17:34]:
>> On Fri, 7 Mar 2008, Konrad wrote:
>>
>> >>> Nice, you probably want to keep the application/kernel tag name spaces
>> >>> distinct though. Otherwise it would be easy for any local user/program
>> >>> to mess with pf.conf generated tags and bypass filtering etc. It could
>> >>> be as easy as adding a prefix ("APP_" ?) to all application generated
>> >>> tags.
>> >
>> >>actually you have a point here... sockets don't even require root.
>> >
>> >That is true, my point is that to change the tags in the kernel is not
>> >a nice way. A programm which set the tag "VPN1" and will get
>> >"APP_VPN1" ?? This is not a good behavior, IMHO.
>>
>> Why not just require that any application-generated tag must start with
>> some fixed string ("APP_" or "@" or whatever)?
>
>not enough, you don't want an app started by joe random to assign the
>same packet as, say, ftp-proxy...

Interesting point.  Exactly what separation of namespaces does need to
be enforced?  Applications running with root privileges presumably
should be able to set any tag.  How many different namespaces are needed
for all the non-root processes, and how do they get assigned to the
appropriate namespace?  Do we need one per user plus one per group to
provide flexibility while preventing interference?  If so, using
prefixes like "@<user-number>U_"  and "@<group_number>G_" would be
simple for both the application designer and the person crafting the pf
rules to understand.  Or should this, at least for the moment, be
limited to root processes?

        Dave

-- 
Dave Anderson
<[EMAIL PROTECTED]>

Reply via email to