> And, such a easy and accessible MAC can help minimizing
> the damage after breach as a last resort.
>

>From what I've seen of OpenBSD, most of the mitigation is done here by
privilege separation.
For exemple, iked(8) is at least 3 process running together. One
process have access to the network and is chroot in /var/empty,
running with minimal privilege. Certificate are handled by another
process and is chroot to /etc/iked.
So in the event the network facing process was compromised, it would
only have access to an empty dir and won't be able to access the
certificates. That is a form of access control, handled by the
developer, not the user.

-- 

Cordialement, Coues Ludovic
+336 148 743 42

Reply via email to