Right. There wouldn't be any _new_ security holes as long as no code
used the new interface (I'm assuming here that no existing safe code
could be tricked into using it, which seems reasonable).
The questions then are:
1) would this new interface serve some useful purpose, and
2) would it encourage safe programming? (unlike, say, the suid feature)
I'd say "yes" to both: it would be useful in that it would allow having
a centralized authorization daemon that would hand out privileges to
programs, and it would encourage safe programming, in that the privileges
are not there from the beginning.
And, since 2.1 is moving toward capabilities, rather than just passing UID's
this method should also be able to pass capabilities, and that _only_ if
the receiving process has the capability to receive them, and the sending
process has the capability to send them.
-- Roger Espel Llima, espel@llaic.u-clermont1.fr http://www.eleves.ens.fr:8080/home/espel/index.html- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html