To make a long story short, the security model is strictly opt in on the
part of the map implementation, the code which cares (e.g.
src/local/alias.c) accepts the declarations of the mapper without question:

* An untrusted mapper commits suicide when informed that it is not wanted.
* A trusted mapper sets ->dict.owner.status = DICT_OWNER_TRUSTED

To make an untrusted (e.g. dict_tcp.c) mapper trusted:

* Don't commit suicide; and
* set dict_tcp->dict.owner.status = DICT_OWNER_TRUSTED

Relax, your hair is not on fire. But maybe, like me, you dislike
security theater; I find it confounds the discussion about real issues.

Based on past reception I have no intention of continuing the discussion
here, if you have issues with the analysis you're welcome to open an
issue.
https://github.com/m3047/trualias/blob/master/install/table_security_analysis.md

--

Fred Morris



Reply via email to