netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Re: Sockets from kernel space?
       [not found] <41C0E720.8050201@comcast.net>
@ 2004-12-16  1:06 ` Arnaldo Carvalho de Melo
  2004-12-16  3:15   ` John Richard Moser
  0 siblings, 1 reply; 3+ messages in thread
From: Arnaldo Carvalho de Melo @ 2004-12-16  1:06 UTC (permalink / raw)
  To: John Richard Moser; +Cc: linux-kernel, netdev

John Richard Moser wrote:
> -----BEGIN PGP SIGNED MESSAGE----- 
> Is it possible to create socket connections (AF_UNIX for example) from
> the kernel to local user processes that are listen()ing?
> 
> A good link to somewhere to help with this would be nice.

Please send networking development related messages to netdev@oss.sgi.com,
there are several networking hackers that don't even subscribe lkml.

Having said that, look at the svc_makesock and svc_create_socket functions
in net/sunrpc/svcsock.c as a starting point.

- Arnaldo

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Sockets from kernel space?
  2004-12-16  3:15   ` John Richard Moser
@ 2004-12-16  2:29     ` Arnaldo Carvalho de Melo
  0 siblings, 0 replies; 3+ messages in thread
From: Arnaldo Carvalho de Melo @ 2004-12-16  2:29 UTC (permalink / raw)
  To: John Richard Moser; +Cc: netdev

John Richard Moser wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Thanks.  I'll look at those.
> 
> I'm aiming at potentially writing an LSM that allows a process to attach
> to the kernel, which will then be sent messages through an AF_UNIX
> (these are the app<->app sockets right?) socket with the details of any
> listen(2) or connect(2) calls made.  I was going to do it in userspace,
> but realized it was easily avoidable that way.
> 
> If this works, I can pretty much securely create a host firewall that
> regulates based on network operations, user, and program.  This would
> allow the creation of discressionary firewalls, like Zone Alarm, Norton
> PF, McAffee PF, etc.  The daemon sits in userspace, the kernel asks it
> for policy decisions, it asks connected/authenticated clients about
> unknown policy, and makes them re-authenticate to get an answer.  The
> authentication is in userspace (PAM), hence the daemon.

Look at the iproute2 code to know how to use netlink 8)

- Arnaldo

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Sockets from kernel space?
  2004-12-16  1:06 ` Sockets from kernel space? Arnaldo Carvalho de Melo
@ 2004-12-16  3:15   ` John Richard Moser
  2004-12-16  2:29     ` Arnaldo Carvalho de Melo
  0 siblings, 1 reply; 3+ messages in thread
From: John Richard Moser @ 2004-12-16  3:15 UTC (permalink / raw)
  To: Arnaldo Carvalho de Melo; +Cc: linux-kernel, netdev

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Thanks.  I'll look at those.

I'm aiming at potentially writing an LSM that allows a process to attach
to the kernel, which will then be sent messages through an AF_UNIX
(these are the app<->app sockets right?) socket with the details of any
listen(2) or connect(2) calls made.  I was going to do it in userspace,
but realized it was easily avoidable that way.

If this works, I can pretty much securely create a host firewall that
regulates based on network operations, user, and program.  This would
allow the creation of discressionary firewalls, like Zone Alarm, Norton
PF, McAffee PF, etc.  The daemon sits in userspace, the kernel asks it
for policy decisions, it asks connected/authenticated clients about
unknown policy, and makes them re-authenticate to get an answer.  The
authentication is in userspace (PAM), hence the daemon.

Arnaldo Carvalho de Melo wrote:
[...]
|
| Please send networking development related messages to netdev@oss.sgi.com,
| there are several networking hackers that don't even subscribe lkml.
|
| Having said that, look at the svc_makesock and svc_create_socket functions
| in net/sunrpc/svcsock.c as a starting point.
|
| - Arnaldo

- --
All content of all messages exchanged herein are left in the
Public Domain, unless otherwise explicitly stated.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFBwP26hDd4aOud5P8RAhSjAJ956RdBt9deoh3RgW7UKWdEgNeLMACeOR+b
nVFR/uA/ZNXkv2b6HYcRczw=
=VUfC
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2004-12-16  3:15 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <41C0E720.8050201@comcast.net>
2004-12-16  1:06 ` Sockets from kernel space? Arnaldo Carvalho de Melo
2004-12-16  3:15   ` John Richard Moser
2004-12-16  2:29     ` Arnaldo Carvalho de Melo

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).