On Fri, 27.06.14 18:08, Mantas Mikulėnas ([email protected]) wrote:

> (The agents usually set themselves as undumpable and untraceable to avoid
> key extraction by the same user's other processes.)

Honestly, playing these games with trying to protect a user processes
from its own user, are snake oil, little else. That's not how Unix
works, and neither does Linux. Access control is inherently bound to
user IDs, nothing else, and just turning off traceability or dumpability
might protect you from accidental leaking, but certainly not from any
real threat.

Lennart

-- 
Lennart Poettering, Red Hat
_______________________________________________
systemd-devel mailing list
[email protected]
http://lists.freedesktop.org/mailman/listinfo/systemd-devel

Reply via email to