From owner-freebsd-hackers Tue Aug 8 10:19:17 2000 Delivered-To: freebsd-hackers@freebsd.org Received: from zeus.superscript.com (zeus.superscript.com [206.234.89.16]) by hub.freebsd.org (Postfix) with SMTP id 47FAD37BA5A for ; Tue, 8 Aug 2000 10:19:08 -0700 (PDT) (envelope-from web@superscript.com) Received: (qmail 10929 invoked by uid 1008); 8 Aug 2000 17:18:49 -0000 Date: Tue, 8 Aug 2000 12:18:49 -0500 From: "William E. Baxter" To: freebsd-hackers@FreeBSD.ORG Cc: bright@wintelcom.net Subject: Re: getpeereid() syscall patch for FreeBSD 4.0 Message-ID: <20000808121849.A27414@zeus.superscript.com> Mail-Followup-To: freebsd-hackers@FreeBSD.ORG, bright@wintelcom.net References: <20000808112602.A17676@zeus.superscript.com> <20000808093527.D4854@fw.wintelcom.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0i In-Reply-To: <20000808093527.D4854@fw.wintelcom.net>; from bright@wintelcom.net on Tue, Aug 08, 2000 at 09:35:28AM -0700 Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG With getpeereid() the credentials are passed at connect() and do not require the client to send data. Therefore clients cannot consume connections anonymously. W. On Tue, Aug 08, 2000 at 09:35:28AM -0700, Alfred Perlstein wrote: > > I haven't used the credential passing feature of sendmsg(), but I > was wondering what advantages this has over being able to pass > kernel verified id's through a unix domain socket using SCM_CREDS. > My reading of UNP seems to indicate that it offers the same features. > > -Alfred Perlstein - [bright@wintelcom.net|alfred@freebsd.org] > "I have the heart of a child; I keep it in a jar on my desk." > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-hackers" in the body of the message To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message