lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 27 Oct 2010 20:50:17 -0600 From: Jeff Hansen <x@...fhansen.com> To: David Miller <davem@...emloft.net> CC: netdev@...r.kernel.org Subject: Re: [PATCH 1/1] net/unix: Allow Unix sockets to be treated like normal files Dave, I agree that on larger systems this doesn't really make sense, but on embedded platforms this can save some code space since applications can get rid of their FIFO listeners and have strictly socket listeners. That's why I made it an option that could be disabled by default. Do you know who originally suggested that "creepy crawlies" are introduced by allowing sockets to be opened? I'd be interested to know how this could affect security, if at all. -Jeff On 10/27/2010 08:32 PM, David Miller wrote: > From: x@...fhansen.com > Date: Thu, 28 Oct 2010 02:24:29 +0000 > >> Resent. Is there anything else I need to do for this patch to get reviewed >> and/or merged? Any comments by anyone? > I don't like this idea at all. > > I remember there is a reason why similar things are not allowed for > sockets, it causes all sorts of problems although I forget the exact > details. > > Take a look at net/socket.c:sock_no_open(), for example. > -- --------------------------------------------------- "If someone's gotta do it, it might as well be me." x@...fhansen.com -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists