Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755970AbZAGF6X (ORCPT ); Wed, 7 Jan 2009 00:58:23 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751823AbZAGF6D (ORCPT ); Wed, 7 Jan 2009 00:58:03 -0500 Received: from lists.laptop.org ([18.85.2.145]:57353 "EHLO mail.laptop.org" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751470AbZAGF6B (ORCPT ); Wed, 7 Jan 2009 00:58:01 -0500 X-Greylist: delayed 545 seconds by postgrey-1.27 at vger.kernel.org; Wed, 07 Jan 2009 00:58:00 EST From: Michael Stone To: linux-kernel@vger.kernel.org Cc: netdev@vger.kernel.org, Michael Stone Subject: RFC: Network privilege separation. Date: Wed, 7 Jan 2009 00:48:53 -0500 Message-Id: <1231307334-9542-1-git-send-email-michael@laptop.org> X-Mailer: git-send-email 1.5.6.6 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1201 Lines: 30 Dear lkml and netdev, I'm trying to implement a kernel facility for unprivileged processes to irrevocably discard their and their future children's ability to perform unrestricted network I/O. (Restricted network I/O, e.g. on sockets which were connected before the privilege-reduction or on filesystem-based sockets is okay.) I want the kernel to provide a facility like this one because such a facility will make it much easier for users, authors, and distributors of userland software to protect themselves and one another from a broad class of malicious software. For the sake of discussion, I have written up and documented one possible implementation of this concept based on the idea of a new rlimit named RLIMIT_NETWORK in the following patch series. I eagerly await your questions, comments, suggestions, and improvements. Thanks very much, Michael P.S. - I'm not subscribed to either lkml or netdev, so please CC me on responses. Thanks! -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/