l4-hurd
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Part 2: System Structure


From: Pierre THIERRY
Subject: Re: Part 2: System Structure
Date: Tue, 23 May 2006 22:15:44 +0200
User-agent: Mutt/1.5.11+cvs20060403

Scribit Bas Wijnen dies 23/05/2006 hora 20:53:
> This capability also allows checking that these banks are opaque.

In all your scenario, you seem to omit something: without the
constructor mechanism, no process can verify anything accurately about
any other process, except if all of the parents of it are to be trusted.

That is, except for a process spawned by the TCB, no capability can be
trusted not to be faked or sniffed. And AFAIK, there is no mean for a
process to check that it has been spawned by the TCB.

But when a process is spawned by a constructor and given some
capabilities to the TCB that the requestor cannot spy or alter, it is be
given the ability to check properties of it's environment accurately.

Am I wrong on anything here?

Curiously,
Nowhere man
-- 
address@hidden
OpenPGP 0xD9D50D8A

Attachment: signature.asc
Description: Digital signature


reply via email to

[Prev in Thread] Current Thread [Next in Thread]