netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: "David S. Miller" <davem@redhat.com>
To: jmorris@intercode.com.au
Cc: kuznet@ms2.inr.ac.ru, netdev@oss.sgi.com,
	linux-security-module@wirex.com
Subject: Re: [PATCH] LSM networking: tcp hooks for 2.5.59 (8/8)
Date: Thu, 30 Jan 2003 16:16:38 -0800 (PST)	[thread overview]
Message-ID: <20030130.161638.83467438.davem@redhat.com> (raw)
In-Reply-To: <Pine.LNX.4.44.0301311113190.32098-100000@blackbird.intercode.com.au>

   From: James Morris <jmorris@intercode.com.au>
   Date: Fri, 31 Jan 2003 11:15:22 +1100 (EST)

   On Thu, 30 Jan 2003, David S. Miller wrote:
   
   > I totally reject this networking security stuff for 2.6.x
   
   Ok.  Thanks for looking at it.
   
James, do not take my comments too harshly please.

I realize the amount of work that went into these
changes and I do appreciate that.

The big problem is that the TCP bits had no apparent attempt to
abstract things out.  What is going to happen, for example, when net
protocol FOO makes mini-sockets too?  Will we make more
security_FOO_*() hooks or will we get smart and abstract this
technique somehow?

See, if I saw things like:

	openreq = sock_make_minisock(sizeof(struct openreq));

then the changes would be more acceptable.

The net/socket.c stuff looks fine.  All the stuff that makes decisions
based upon packets is highly questionable.  Netfilter can do all of
this work, it even has connection tracking infrastructure for TCP
connections.

I think with the net/socket.c stuff to take care of the user
side and some ingenious netfilter hacks for the packet side,
you could accomplish everything you need for the security stuff.

If you think this is implementable, then I'll happily accept the
net/socket.c stuff and even the af_unix hack, with the assumption
being that the rest can be handled by netfilter or something similar.
Oh yes, I'd also take the netlink capability thing too as long as it
was inlined properly for the no-security case.

  reply	other threads:[~2003-01-31  0:16 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2003-01-30 22:42 [PATCH] LSM networking: introduction (0/8) James Morris
2003-01-30 22:46 ` [PATCH] LSM networking: kconfig (1/8) James Morris
2003-01-30 22:51   ` [PATCH] LSM networking: netdev hooks for 2.5.59 (2/8) James Morris
2003-01-30 22:56     ` [PATCH] LSM networking: skb hooks for 2.5.59 (3/8) James Morris
2003-01-30 23:01       ` [PATCH] LSM networking: socket hooks for 2.5.59 (4/8) James Morris
2003-01-30 23:06         ` [PATCH] LSM networking: ipv4 hooks for 2.5.59 (5/8) James Morris
2003-01-30 23:10           ` [PATCH] LSM networking: netlink hooks for 2.5.59 (6/8) James Morris
2003-01-30 23:17             ` [PATCH] LSM networking: af_unix hooks for 2.5.59 (7/8) James Morris
2003-01-30 23:22               ` [PATCH] LSM networking: tcp hooks for 2.5.59 (8/8) James Morris
2003-01-30 23:25                 ` David S. Miller
2003-01-31  0:15                   ` James Morris
2003-01-31  0:16                     ` David S. Miller [this message]
2003-02-01  0:12                       ` James Morris
2003-01-30 23:19             ` [PATCH] LSM networking: netlink hooks for 2.5.59 (6/8) David S. Miller

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20030130.161638.83467438.davem@redhat.com \
    --to=davem@redhat.com \
    --cc=jmorris@intercode.com.au \
    --cc=kuznet@ms2.inr.ac.ru \
    --cc=linux-security-module@wirex.com \
    --cc=netdev@oss.sgi.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).