On Dec 9, 2009, at 4:23 AM, Alastair Houghton wrote:

> Specifically, a potential attacker will deliberately not follow this 
> convention.  The Security Server used to get the information for the program 
> name in this manner, which created quite an interesting vulnerability since 
> you could get it to display an authorisation dialog with *any* name you 
> wanted in it.  I blogged about that particular security hole some time ago:

Drifting far afield from Cocoa... but it seems that there isn't a good Cocoa 
solution for this. Snow Leopard has a very good audit trail system with a live 
audit stream /dev/auditpipe. With a little work, this could potentially be used 
to map process IDs to the disk image they are running.

Todd

_______________________________________________

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
http://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to