Re: Random Register Contents

Alan Cox (alan@lxorguk.ukuu.org.uk)
Tue, 3 Nov 1998 22:13:44 +0000 (GMT)


> Since in a UNIX system authority to access a filesystem is basically tied to an
> identity (a user's id), how exactly does Xenix prevent a process from leaking
> information through the filesystem (or any other means, it's the same issue
> anyway) to another process by the same user?

B2 is tied to priviledge levels and 'compartmentalisation' stuff.

> files share the same filename space as the rest of the system. As soon as you
> are able to test for the availability of a specific filename, you have a
> possible filesystem based covert channel.

In a correct configuration there is no shared writable space, so the naming
problem doesnt occur

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/