Assuming the authenticator and petitioner communicate via some sort
of secure RPC (on the same machine as one another, natch)...would
something about UNIX domain SOCK_STREAM sockets stick around enough
to guarantee failure if the original petitioner dies? If not, would
POSIX allow it? Or could we define some cookie unique to each
process (PID . start_time should suffice?), that a process could
determine (unerringly) and pass to the authenticator, which would
use that cookie for set_his_euid(cookie_t *cookie, uid_t uid)?
Keith
-- "The avalanche has already started; |Linux: http://www.linuxhq.com |"Zooty, it is too late for the pebbles to |KDE: http://www.kde.org | zoot vote." Kosh, "Believers", Babylon 5 |Keith: kwrohrer@enteract.com | zoot!" www.midwinter.com/lurk/lurker.html |http://www.enteract.com/~kwrohrer | --Rebo- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html