On Mon, 22.06.09 19:59, Jens M Andreasen (jens.andreasen(a)comhem.se) wrote:
Since it is rogue processes - from the interweb? - rather than rough
users that are the potential problem, wouldn't the cure then be to grant
certain trusted applications RT-privileges?
A novice user would install well-known binaries from the distros
repository. The binary runs as user 'rt-audio' which is the only/one of
the few users on the system granted rt privileges.
But uh, that app could then not access the starting user's file in any
way.
There is no such thing a trusted user applications. And I don't think
we want to go down the road to sandboxing for this.
Lennart
--
Lennart Poettering Red Hat, Inc.
lennart [at] poettering [dot] net
http://0pointer.net/lennart/ GnuPG 0x1A015CC4