Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 14 Aug 1998 00:04:29 -0400 (EDT)
From:      Joe Orthoefer <orthoefe@gte.net>
To:        Philippe Regnauld <regnauld@deepo.prosa.dk>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Fwd: "Using capabilties aaginst shell code" <dps@IO.STARGATE.CO.UK>
Message-ID:  <Pine.BSF.3.96.980813234929.368A-100000@localhost>
In-Reply-To: <19980814123240.63855@deepo.prosa.dk>

next in thread | previous in thread | raw e-mail | index | archive | help

Secure Computing's Sidewinder firewall (built on top of BSDI 2.2) has
something similar, they added an additional credential field (as near as I
can tell) to processes in order to create role accounts in addition to the
normal unix'y thing of user id's and group id's.  You login as a user,
under a certain role (web, mail, ftp,...), or you start up daemon's at
boot (before going multiuser) running under certain roles.  The entries to
the system calls check to see if the role a process is running as has
access to any particular system call.  The set of ACL's is compiled into
the kernel, with no way to easily change those ACL's once the machine is
booted, to do major administration you boot into a different kernel with a
lax set of ACL's and no network support. 

There use to be some white papers at TIS' old site that described similar
modifications that they came up with in association with their "Trusted
Mach" research.

Joe Orthoefer


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980813234929.368A-100000>