> On 5 Jun 2025, at 5:12 PM, Jonathan Stone <kiwi_jonat...@yahoo.com> wrote:
> 
> 
> 
> On Thursday, June 5, 2025 at 09:36:58 AM PDT, Emmanuel Nyarko 
> <emmankoko...@gmail.com> wrote:
> 
> 
> > Errmmm, I was thinking that it maybe becomes a default behavior.
> > 
> > I mean every socket should be owned by the process that the socket was 
> > created for.
> [...]
> You say "should" be owned? Why? You're proposing a change at the SOL_SOCKET 
> level, which means it will apply to Unix-domain sockets.

> What are the impacts of changing the owner of that socket to the uid of 
> forked process, instead of the uid of the creator (presumably root)?
User based server security with NPF. Similar to a DenyUser or Match allowUser 
in sshd_config.
If you want to filter (block/pass) certain packets on sockets created by Unix 
servers, other user configs becomes “useless” since the socket is only root.
> 
> Deploying the proposed change everywhere that runs -current, without testing 
> and experience, seems... premature. It has security implications. So until 
> that experience is gained, I suggest making the feature 'opt-in', both 
> system-wide, and per socket -- that is, the original creator has to issue a 
> setsockopt() to enable the feature when (at minimum) the global setting is 
> "off”.
I totally agree with you!!! That sounds better. 
> 
> But hey, it's not my say.

A scoffer seeks wisdom in vain, but knowledge is easy for a man of 
understanding.
Emmanuel





Reply via email to