Re: Sockets from kernel space?
From: John Richard Moser
Date: Wed Dec 15 2004 - 22:15:36 EST
-----BEGIN PGP SIGNED MESSAGE-----
Thanks. I'll look at those.
I'm aiming at potentially writing an LSM that allows a process to attach
to the kernel, which will then be sent messages through an AF_UNIX
(these are the app<->app sockets right?) socket with the details of any
listen(2) or connect(2) calls made. I was going to do it in userspace,
but realized it was easily avoidable that way.
If this works, I can pretty much securely create a host firewall that
regulates based on network operations, user, and program. This would
allow the creation of discressionary firewalls, like Zone Alarm, Norton
PF, McAffee PF, etc. The daemon sits in userspace, the kernel asks it
for policy decisions, it asks connected/authenticated clients about
unknown policy, and makes them re-authenticate to get an answer. The
authentication is in userspace (PAM), hence the daemon.
Arnaldo Carvalho de Melo wrote:
| Please send networking development related messages to netdev@xxxxxxxxxxx,
| there are several networking hackers that don't even subscribe lkml.
| Having said that, look at the svc_makesock and svc_create_socket functions
| in net/sunrpc/svcsock.c as a starting point.
| - Arnaldo
All content of all messages exchanged herein are left in the
Public Domain, unless otherwise explicitly stated.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/