[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] severe security issue on dom0/xend/xm/non-root users
David Hopwood wrote: There are several techniques you could be referring to: <http://www.whitefang.com/sup/secure-faq.html#LOCAL4><http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/sockets.html>but they all sound to me like complicated and nonportable hacks. Which onedid you mean? SCM_CREDENTIALS on Linux, SCM_CREDS on some versions of BSD, SO_PEERNAME on some other Unices. They all do just about the same thing. Just have to choose the right mechanism at compile time. Regards, Anthony Liguori ------------------------------------------------------- SF email is sponsored by - The IT Product Guide Read honest & candid reviews on hundreds of IT Products from real users. Discover which products truly live up to the hype. Start reading now. http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxxx https://lists.sourceforge.net/lists/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |