Darren J Moffat wrote:
> Garrett D'Amore wrote:
>> The process arguments are not interpreted, only passed back out to a 
>> mixer panel application so that the end user who wants to adjust the 
>> volume associated with a specific application can do so from a common 
>> mixer application.
>
> There needs to be a zone check in here so that you don't pass the 
> names of commands running in one zone to a mixer running in another.
>
Are we concerned about data leakage here?  (I.e. user in trusted zone A 
uses this API to pass private information into untrusted zone B?)

Wouldn't a far bigger risk exist simply by using the audio *data path* 
to pass data.   Since the audio file is generally associated with *real* 
hardware, I'd think it would be a really bad idea to make it available 
in a zone with a different security label than the global zone.  One 
could imagine a  *lower* security zone having *playback only* (it can 
play alert messages for example), but it should probably *never* have 
access to the hardware settings, and should probably *never* have access 
to record facilities.

Does audio even work properly across zones today?  I'm pretty sure it 
doesn't work in xVM domU, but I've not tried zones.

I might need to have a separate chat with some security gurus about the 
security implications of non-global zones, and what if anything, we 
should do about them.

    -- Garrett
_______________________________________________
opensolaris-code mailing list
[email protected]
http://mail.opensolaris.org/mailman/listinfo/opensolaris-code

Reply via email to