> And, such a easy and accessible MAC can help minimizing > the damage after breach as a last resort. >
>From what I've seen of OpenBSD, most of the mitigation is done here by privilege separation. For exemple, iked(8) is at least 3 process running together. One process have access to the network and is chroot in /var/empty, running with minimal privilege. Certificate are handled by another process and is chroot to /etc/iked. So in the event the network facing process was compromised, it would only have access to an empty dir and won't be able to access the certificates. That is a form of access control, handled by the developer, not the user. -- Cordialement, Coues Ludovic +336 148 743 42