From owner-cvs-all Thu Oct 25 6:31:48 2001 Delivered-To: cvs-all@freebsd.org Received: from fledge.watson.org (fledge.watson.org [204.156.12.50]) by hub.freebsd.org (Postfix) with ESMTP id EAA1D37B401; Thu, 25 Oct 2001 06:31:41 -0700 (PDT) Received: from fledge.watson.org (robert@fledge.pr.watson.org [192.0.2.3]) by fledge.watson.org (8.11.6/8.11.5) with SMTP id f9PDVaB67957; Thu, 25 Oct 2001 09:31:36 -0400 (EDT) (envelope-from robert@fledge.watson.org) Date: Thu, 25 Oct 2001 09:31:36 -0400 (EDT) From: Robert Watson X-Sender: robert@fledge.watson.org To: John Baldwin Cc: cvs-all@FreeBSD.org, cvs-committers@FreeBSD.org Subject: RE: cvs commit: src/sys/sys socketvar.h In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG On Wed, 24 Oct 2001, John Baldwin wrote: > > On 25-Oct-01 Robert Watson wrote: > > rwatson 2001/10/24 19:03:37 PDT > > > > Modified files: > > sys/sys socketvar.h > > Log: > > o Remove extern showallsockets, defunct as of the change to > > kern.security.seeotheruids_permitted. This was missed in the > > commit that made this change elsewhere. > > As a somewhat unrelated sidenote: can you trim the name of that sysctl > to kern.security.seeotheruids, or perhaps to > kern.security.see_other_uids (which is easier on my eyes at least). It > would seem that the '_permitted' is redundant and not needed just as the > old ps syctl was ps_showallprocs, not ps_showallprocs_permitted. The theory was I would append _approved and _permitted to fields in kern.security based on whether the corresponded to feature availability, or a policy decision. I agree that the current names are unwieldy, but am not yet sure I know what the right names should be. My temptation was to stick in an additional name, specifying the policy being modified, and trim the _whatever: kern.security.bsd.see_all_uids kern.security.bsd.unprivileged_proc_debug kern.security.bsd.suser_enabled This would allow other stuff to be slotted in dynamically when other policies are active: kern.security.cap.cap_enabled kern.security.cap.global_bound kern.security.mac.biba_enabled kern.security.mac.mls_enabled kern.security.mac.suser_overrides Does this seem more seemly to you? Robert N M Watson FreeBSD Core Team, TrustedBSD Project robert@fledge.watson.org NAI Labs, Safeport Network Services To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message