On Wed, Oct 29, 2014 at 3:00 PM, Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> wrote: > * Attachment of trustable metadata to each message on demand, such as > the sending peer's timestamp, creds, auxgroups, comm, exe, cmdline, > cgroup path, capabilities, security label, audit information, etc, > each taken at the time the sender issued the ioctl to send the > message. Which of those are actually recorded and attached is > controlled by the receiving peer. I think that each piece of trustable metadata needs to be explicitly opted-in to by the sender at the time of capture. Otherwise you're asking for lots of information leaks and privilege escalations. This is especially important given that some of the items in the current list could be rather sensitive. NB: UNIX sockets get this wrong, too, but that doesn't mean that kdbus gets to blindly follow SCM_CREDENTIALS's lead. Also, there is no excuse here about legacy code that won't opt in when needed. --Andy -- To unsubscribe from this list: send the line "unsubscribe linux-api" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html