Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 7 Oct 2025 12:25:40 -0300
From:      =?UTF-8?Q?Vin=C3=ADcius_dos_Santos_Oliveira?= <vini.ipsmaker@gmail.com>
To:        freebsd-hackers@freebsd.org
Subject:   Capsicum revocable (proxy) file descriptors
Message-ID:  <CAK9RveLzVt=c-9Y18_A79KbNtopiJtjZHBjdjXLBvH-bBwht2w@mail.gmail.com>

next in thread | raw e-mail | index | archive | help

I was wondering what design choices other developers would have when
designing a new file descriptor type for access revocation purposes in
a capability system.

The standard practice to revoke capabilities is to create a new
capability in a domain the user has control over and can revoke at any
later time[1]. For Capsicum, we can't quite do that.

If a new file descriptor type were to be designed just to forward
requests (which the creator could revoke later), what design concerns
should be taken into consideration?

[1] http://wiki.erights.org/wiki/Walnut/Secure_Distributed_Computing/Capability_Patterns#Revocable_Capabilities



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAK9RveLzVt=c-9Y18_A79KbNtopiJtjZHBjdjXLBvH-bBwht2w>