* Re: Sockets from kernel space? [not found] <41C0E720.8050201@comcast.net> @ 2004-12-16 1:06 ` Arnaldo Carvalho de Melo 2004-12-16 3:15 ` John Richard Moser 0 siblings, 1 reply; 3+ messages in thread From: Arnaldo Carvalho de Melo @ 2004-12-16 1:06 UTC (permalink / raw) To: John Richard Moser; +Cc: linux-kernel, netdev John Richard Moser wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Is it possible to create socket connections (AF_UNIX for example) from > the kernel to local user processes that are listen()ing? > > A good link to somewhere to help with this would be nice. Please send networking development related messages to netdev@oss.sgi.com, there are several networking hackers that don't even subscribe lkml. Having said that, look at the svc_makesock and svc_create_socket functions in net/sunrpc/svcsock.c as a starting point. - Arnaldo ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Sockets from kernel space? 2004-12-16 1:06 ` Sockets from kernel space? Arnaldo Carvalho de Melo @ 2004-12-16 3:15 ` John Richard Moser 2004-12-16 2:29 ` Arnaldo Carvalho de Melo 0 siblings, 1 reply; 3+ messages in thread From: John Richard Moser @ 2004-12-16 3:15 UTC (permalink / raw) To: Arnaldo Carvalho de Melo; +Cc: linux-kernel, netdev -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Thanks. I'll look at those. I'm aiming at potentially writing an LSM that allows a process to attach to the kernel, which will then be sent messages through an AF_UNIX (these are the app<->app sockets right?) socket with the details of any listen(2) or connect(2) calls made. I was going to do it in userspace, but realized it was easily avoidable that way. If this works, I can pretty much securely create a host firewall that regulates based on network operations, user, and program. This would allow the creation of discressionary firewalls, like Zone Alarm, Norton PF, McAffee PF, etc. The daemon sits in userspace, the kernel asks it for policy decisions, it asks connected/authenticated clients about unknown policy, and makes them re-authenticate to get an answer. The authentication is in userspace (PAM), hence the daemon. Arnaldo Carvalho de Melo wrote: [...] | | Please send networking development related messages to netdev@oss.sgi.com, | there are several networking hackers that don't even subscribe lkml. | | Having said that, look at the svc_makesock and svc_create_socket functions | in net/sunrpc/svcsock.c as a starting point. | | - Arnaldo - -- All content of all messages exchanged herein are left in the Public Domain, unless otherwise explicitly stated. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFBwP26hDd4aOud5P8RAhSjAJ956RdBt9deoh3RgW7UKWdEgNeLMACeOR+b nVFR/uA/ZNXkv2b6HYcRczw= =VUfC -----END PGP SIGNATURE----- ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Sockets from kernel space? 2004-12-16 3:15 ` John Richard Moser @ 2004-12-16 2:29 ` Arnaldo Carvalho de Melo 0 siblings, 0 replies; 3+ messages in thread From: Arnaldo Carvalho de Melo @ 2004-12-16 2:29 UTC (permalink / raw) To: John Richard Moser; +Cc: netdev John Richard Moser wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Thanks. I'll look at those. > > I'm aiming at potentially writing an LSM that allows a process to attach > to the kernel, which will then be sent messages through an AF_UNIX > (these are the app<->app sockets right?) socket with the details of any > listen(2) or connect(2) calls made. I was going to do it in userspace, > but realized it was easily avoidable that way. > > If this works, I can pretty much securely create a host firewall that > regulates based on network operations, user, and program. This would > allow the creation of discressionary firewalls, like Zone Alarm, Norton > PF, McAffee PF, etc. The daemon sits in userspace, the kernel asks it > for policy decisions, it asks connected/authenticated clients about > unknown policy, and makes them re-authenticate to get an answer. The > authentication is in userspace (PAM), hence the daemon. Look at the iproute2 code to know how to use netlink 8) - Arnaldo ^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2004-12-16 3:15 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <41C0E720.8050201@comcast.net>
2004-12-16 1:06 ` Sockets from kernel space? Arnaldo Carvalho de Melo
2004-12-16 3:15 ` John Richard Moser
2004-12-16 2:29 ` Arnaldo Carvalho de Melo
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).