Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262870AbTI2HXn (ORCPT ); Mon, 29 Sep 2003 03:23:43 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262861AbTI2HV5 (ORCPT ); Mon, 29 Sep 2003 03:21:57 -0400 Received: from parcelfarce.linux.theplanet.co.uk ([195.92.249.252]:46283 "EHLO www.linux.org.uk") by vger.kernel.org with ESMTP id S262860AbTI2HV3 (ORCPT ); Mon, 29 Sep 2003 03:21:29 -0400 Date: Mon, 29 Sep 2003 08:21:27 +0100 From: viro@parcelfarce.linux.theplanet.co.uk To: Oliver Tennert Cc: linux-kernel@vger.kernel.org Subject: Re: Why Sysrq+k does not offer a trusted path Message-ID: <20030929072127.GN7665@parcelfarce.linux.theplanet.co.uk> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.1i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Sep 29, 2003 at 08:53:59AM +0200, Oliver Tennert wrote: > Thus it is a more secure way to offer a real SAK. > > Or am I missing a very important point? Scanning through the file descriptor tables of processes does not catch every opened file out there. For trivial example consider attaching an open file to SCM_RIGHTS datagram and sending it to yourself. Then close the original descriptor. Later you will be able to receive the datagram and get your opened file back. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/