Re: In-kernel Authentication Tokens (PAGs)

From: Kyle Moffett
Date: Tue Jun 15 2004 - 14:02:47 EST


On Jun 15, 2004, at 05:36, David Howells wrote:
You might want to look at this patch. It's what I've come up with to support
kafs, but it's general, and should work for anything. It's been built along
Linus's guidelines, and has Linus's approval, contingent on something actually
using it fully.

You can use the session keyring number as a PAG ID if you wish.

I've a sample aklog program (key submission) should you be interested.

One thing that I would very much like to have is the ability to create a new
shell with a new keyring, such that I can still see and use the old keyring,
but I can create new keys without modifying the old keyring, even to the
extent of masking out keys in the old keyring without modifying them for
other processes. From my brief glance at your patch, that's not a feature
you have implemented. I would also like the ability to mark a key as
unreadable except by kernel threads or processes with CAP_KEYRING.
If I can pass key "handles" of some sort over UNIX sockets, then I can
also pass an unreadable key to a daemon process which uses it to
access my files until I revoke the key.

Cheers,
Kyle Moffett

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/