From: John Haxby <john.haxby@oracle.com>
To: netfilter-devel@vger.kernel.org
Subject: Whither xt_SYSRQ?
Date: Tue, 11 May 2010 15:32:06 +0100 [thread overview]
Message-ID: <4BE96A66.4040607@oracle.com> (raw)
The earlier discussions about whether to include xt_SYSRQ in mainline
seem to have petered out with no clear consensus. As I recall, there
were two suggestions as an alternative: use k(g)dboe and use a dedicated
standalone module.
The former suggestion, kdboe, doesn't seem to fly because it's not in
the kernel and also (unless I'm mistaken) provides little or no
concession to security. It's great for development but in the case
where xt_SYSRQ can be used in a production environment, it doesn't seem
to work. Providing the environment for the debugger to work in is also
likely to involve installing a lot on a production machine that wouldn't
normally be there. (xt_SYSRQ is nice and light and would sit nicely
alongside, for example, netconsole.)
The standalone module is troublesome. If I was starting from scratch
with that I'd be putting in filters and whatnot that match those
provides by xtables anyway. If everything apart from the actual
function (sysrq) and password control is duplicated by xtables then
you'd have to ask "why isn't this part of xtables?".
I know xt_SYSRQ is used by quite a few people and it is seen as
generally useful, so what needs to be done to get this into the mainline
kernel? Once it's there it stands a good chance of being backported to
some of the production kernels (RHEL6, I'm looking at you) but without
having some upstream commitment that seems a distant dream.
if xt_SYSRQ isn't acceptable, what is? (Bearing in mind that I believe
that whatever it is needs to be acceptable to a production environment.)
jch
next reply other threads:[~2010-05-11 14:32 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-05-11 14:32 John Haxby [this message]
2010-05-11 17:06 ` Whither xt_SYSRQ? Patrick McHardy
2010-05-14 9:14 ` John Haxby
2010-05-14 10:23 ` Patrick McHardy
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4BE96A66.4040607@oracle.com \
--to=john.haxby@oracle.com \
--cc=netfilter-devel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).