Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 20 Jun 2000 18:48:28 -0400 (EDT)
From:      Andrew Reiter <s467338@gettysburg.edu>
To:        James Howard <howardjp@wam.umd.edu>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Network ACLs
Message-ID:  <Pine.GSO.3.96.1000620184638.7715A-100000@jupiter2>
In-Reply-To: <200006202237.SAA20291@rac10.wam.umd.edu>

next in thread | previous in thread | raw e-mail | index | archive | help

Imo, it's not too difficult to add ACLs via a kernel hack or via a KLD and
then setting a higher securelevel.  The socket syscall gets passed a
structu proc *p [like all other syscalls], and therefore one can check
uid, euid, etc etc etc... and do a hack in this manor.

Andrew

On Tue, 20 Jun 2000, James Howard wrote:

|I know that the TrustedBSD group is working on filesystem ACLs.  Will
|something similar be extended to the socket interface?
|
|Thanks, Jamie
|
|
|To Unsubscribe: send mail to majordomo@FreeBSD.org
|with "unsubscribe freebsd-security" in the body of the message
|

---------------------------------------------------------
Andrew Reiter	                 <s467338@gettysburg.edu> 
Computer Security Engineer     



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.3.96.1000620184638.7715A-100000>