From owner-freebsd-stable@FreeBSD.ORG Tue Apr 4 14:07:46 2006 Return-Path: X-Original-To: freebsd-stable@freebsd.org Delivered-To: freebsd-stable@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id A7FE516A420 for ; Tue, 4 Apr 2006 14:07:46 +0000 (UTC) (envelope-from vivek@khera.org) Received: from yertle.kcilink.com (yertle.kcilink.com [65.205.34.180]) by mx1.FreeBSD.org (Postfix) with ESMTP id 599CE43D48 for ; Tue, 4 Apr 2006 14:07:46 +0000 (GMT) (envelope-from vivek@khera.org) Received: from [192.168.7.103] (host-103.int.kcilink.com [192.168.7.103]) by yertle.kcilink.com (Postfix) with ESMTP id E427DB80C for ; Tue, 4 Apr 2006 10:07:45 -0400 (EDT) Mime-Version: 1.0 (Apple Message framework v746.3) In-Reply-To: References: Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed Message-Id: Content-Transfer-Encoding: 7bit From: Vivek Khera Date: Tue, 4 Apr 2006 10:07:44 -0400 To: freebsd-stable X-Mailer: Apple Mail (2.746.3) Subject: Re: [HACKERS] semaphore usage "port based"? X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Apr 2006 14:07:46 -0000 On Apr 3, 2006, at 3:41 PM, Daniel Eischen wrote: >> ... and you *still* haven't shown *why* kill() reporting a PID is >> in use, >> even if its not in the current jail, is such a security threat ... > > For reducing attacks I suppose. But conceptually, something running > in a jail shouldn't be allowed to see out. I don't think it gives you much information given that PIDs come and go and there's no atomicity in checking if it exists, and then finding what it is. Even on the same jail the PID could go away after you check for it before you try to pry into what it is or do something else. I think it is an overly paranoid attempt at hiding information that is otherwise useful. At worst there should be a sysctl to enable it.