l4-hurd
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Alternative network stack design


From: Tom Bachmann
Subject: Re: Alternative network stack design
Date: Mon, 08 Jan 2007 15:50:45 +0100
User-agent: Thunderbird 1.5.0.9 (X11/20061231)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Marcus Brinkmann schrieb:
> The decision which processes can access a tagged resource with extra
> privileges would be made by the processes doing the tagging according
> to its security policy.

How is that different from a design where every process can hand out
intransparent memory (that is, memory the process can only reclaim, not
inspect)? Wouldn't your design introduce all the harmful properties it
tries to abolish in the first place?
- --
- -ness-
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFolpFvD/ijq9JWhsRAsSHAJ9bifmdJus2yLY68OE7SXF8ubzsbACfX9EK
l55rXsWQyEMhxc+TkgORHqw=
=Y/Fk
-----END PGP SIGNATURE-----




reply via email to

[Prev in Thread] Current Thread [Next in Thread]