lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sun, 19 Jun 2016 07:31:11 +0200
From:	Shanker Wang <miao.wang@...a.tsinghua.edu.cn>
To:	David Miller <davem@...emloft.net>
Cc:	netdev@...r.kernel.org, hannes@...essinduktion.org,
	richard.weinberger@...il.com, g.nault@...halink.fr
Subject: Re: [PATCH] net:ppp: replace too strict capability restriction on opening /dev/ppp


> 在 2016年6月19日,07:24,David Miller <davem@...emloft.net> 写道:
> 
> From: Shanker Wang <miao.wang@...a.tsinghua.edu.cn>
> Date: Sun, 19 Jun 2016 07:21:27 +0200
> 
>> This patch removes the check for CAP_NET_ADMIN in the initial namespace
>> when opening /dev/open. Instead, CAP_NET_ADMIN is checked in the user
>> namespace the net namespace was created so that /dev/ppp cat get opened
>> in a unprivileged container.
>> 
>> Cc: Hannes Frederic Sowa <hannes@...essinduktion.org>
>> Cc: Richard Weinberger <richard.weinberger@...il.com>
>> Cc: Guillaume Nault <g.nault@...halink.fr>
>> Cc: Miao Wang <shankerwangmiao@...il.com>
>> Signed-off-by: Miao Wang <miao.wang@...a.tsinghua.edu.cn>
> 
> Why are you posting this again?

Sorry for re-sending this e-mail. But the e-mail address of mine has been 
changed. And I haven’t seen this e-mail in several kernel mail list 
archives after a night of sleep. I’m wondering if the e-mail is sent
correctly. So I finally decide to re-send this e-mail. Again, I feel
sorry for sending the same thing for two times.

BTW, how can i judge if my e-mail is correctly sent to the mail list?

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ