Date: Thu, 20 Jul 2000 11:38:34 -0600 From: Warner Losh <imp@village.org> To: Marcel Moolenaar <marcel@cup.hp.com> Cc: Robert Watson <rwatson@FreeBSD.org>, cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org, security-officer@FreeBSD.org Subject: Re: cvs commit: src/sys/i386/linux linux_dummy.c linux_misc.c Message-ID: <200007201738.LAA91857@harmony.village.org> In-Reply-To: Your message of "Thu, 20 Jul 2000 10:30:16 PDT." <39773728.7D94D63F@cup.hp.com> References: <39773728.7D94D63F@cup.hp.com> <Pine.NEB.3.96L.1000720125351.85018B-100000@fledge.watson.org>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <39773728.7D94D63F@cup.hp.com> Marcel Moolenaar writes: : There's no such thing as half-security. You either (try to) provide a : secure emulator or you don't. Currently, the Linuxulator has many holes. : If we're going to shift our focus from getting the most applications to : run to making the Linuxulator secure, we have to take into account all : the non-technical consequences as well. Which ever way we choose, we : need to have the support of the FreeBSD community at large. I'm sure that if we could bring a more secure version of Linux than Linux, we'd have widespread support. What things would break if we did them more securely? : BTW: Making the Linuxulator secure is relatively easy if you only count : Linux binaries that are developed for a real Linux system. It's much : harder to make it secure for any Linux binaries that are designed to : exploit bugs in the Linuxulator, right? No. Programs that attack bugs in the linuxulator need to be defended against. Otherwise, we've just introduced a big, huge security hole into FreeBSD which isn't acceptible. Lots of people run the Linuxulator, so any attacks that one can launch on it will have a large i mpact in our user base. Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200007201738.LAA91857>