SYSTEM ARCHITECTURE COUNCIL
                          Platform Software ARC
                    ---------------------------------
PSARC Regular Meeting time: Wednesdays 10:00-1:00pm in MPK17-3507.

                          02-24-2010 MEETING MINUTES
============================================================================
Send CORRECTIONS, additions, deletions to psarc-coord at sun.com.
Minutes are archived in sac.Eng:/sac/export/sac/Minutes/PSARC.

Co-Chair(s):
        Sebastien Roy:          Yes
        Tim Marsland:           no

ATTENDEES - Members: (6 active members)
        Mark Carlson:           Out
        Richard Matthews:       Yes
        Darren Moffat:          no  (on sabbatical)
        Garrett D'Amore:        No
        Bill Sommerfeld:        no  (on sabbatical)
        Gary Winiger:           Yes  (on sabbatical)

        Glenn Skinner:          Yes (external)

STAFF -
        Asa Romberger (PM):     Yes

ATTENDEES - Interns:
        Frank Che               no
        James Falkner:          no (on sabbatical)
        Daniel Hain:            Yes
        Michael Haines:         no
        Alan Hargreaves:        no
        Phil Harman:            no
        Wyllys Ingersoll:       no
        Darren Reed:            no
        Dean Roehrich           no
        Ienup Sung:             no
        Phi Tran                no
        Brian Utterback:        no
        James Walker            Yes
        Suhasini Peddada        Yes
        Calum Mackay            no

        Don Cragun              Yes (external)

ATTENDEES - LSARC members:
        Mark Martin             Yes (external)

Guests:

-- GUESTS --

        Rao Shoaib
        Anders Persson

Not all names are captured. Please send email to Asa.Romberger at Sun.com, if
you attended the meeting and your name is missing from the list.

---------------------------------------------------------------------------

MEETING SUMMARY:
================

AGENDA

     02/24/2010
        10 minutes     Open ARC Business (use open dial in above)
        45 minutes     Socket Filter Framework (2009/590)
                Name:           Socket Filter Framework
                Submitter:      anders.persson at sun.com
                Owner:          Sebastien Roy
                Intern:         Suhasini Peddada
                Exposure:       open

---------------------------------------------------------------------------
Case Anchors: <br>
<A HREF="#case1">Socket Filter Framework (2009/590)</A> <br>
===========================================================================

Fast Tracks:
============

Fast-tracks:
     Case (Timeout) Exposure Title
     2010/062 (03/01/10) open     increase number of realtime signals
        let it run

Next Meeting:
=============

     03/03/2010
        10 minutes     Open ARC Business (use open dial in above)
        45 minutes     SNAP BE Management (2010/059)
                Name:           SNAP BE Management
                Submitter:      James.Walker
                Owner:          Mark.Carlson
                Exposure:       open


-----------------------------------------------------------------------------------------------

IAM
====

Name:           Socket Filter Framework
Submitter:      anders.persson at sun.com
Owner:          Sebastien Roy
Intern:         Suhasini Peddada
Exposure:       open

SUMMARY
=======

        This is a project to implement a socket filter framework, which
        makes it possible for modules to intercept requests and 
notifications
        passed between the socket and protocol layers. The Solaris SSL 
kernel
        proxy (PSARC/2005/625) will be converted to use the framework.

ISSUES
=======

 PSARC/2009/590 Socket Filter Framework
 Inception review issues:

 DJM-1  What filters will be provided with the initial integration

 DJM-2  Will it be possible to build a filter that can easily
        control all off host networking on a per user basis ?
        eg any user in a given group or with a given uid can't
        access the network but can do local socket stuff ?

        In other words can this case provide a solution to 6215035 ?

 DJM-3  Even we have exlusive stack networking the fact that
        filters can only be managed from the global zone seems
        very surprising to me as someone who doesn't understand
        the internals of this part of networking.  As such I think
        this will be very surprising to admins, who I expect will
        want to be able to provide different filtering per zone.

        Would it be possible for soconfig(1M) to allow specifying
        which zones the filters apply to ?

 DJM-4  Is it possible to give a non global zone sufficient privilege
        so that it can mange filters ?

 DJM-5  What privileges are required to setup a filter programatically ?

 DJM-6  What RBAC rights profile will soconfig(1M) be in and what
        privileges will it run with ?

 ram-1  What is the proposed release binding of this change?

 GED-0  As a level 0, I would like to understand why we need a different
        framework for sockets than we use for other kinds of networking.
        (I.e. STREAMS).

 GED-1  Is it really appropriate that we expose this API to external 
consumers
        as Committed?  If its only for KSSL, perhaps we ought to start with
        a more limited Committment?  At least until we have some experience
        with it?  Are there other kinds of consumers expected.

 kb-01  callback for sof_accept?

 kb-02   add FMRI for the SMF service to the interface table.

Commitment review issues:

seb-1   Since inception, 2009/685 was submitted and approved.  The
        approach used by that case to restrict network access is crude
        and has serious limitations.  Could socket filters be extended
        to provide more fine-grained controls (per socket, per user,
        etc.).  There is evidently a related FGAP project (Fine
        Grained Access Policy), perhaps the project team has or can
        investigate the potential intersections...

seb-2   Interface table nit: there is no such thing as an Unstable
        interface.  The old taxonomy had such a concept, but the
        newer equivalent is Uncommitted.

seb-3   Why one service per filter rather than one service instance
        per filter?

VOTE
====
Approve - Seb, Rick, Garrett
Deny -
Abstain - Glenn
Not Participating (NP) -


THE NEXT STEP
=============

        Team: Work with Casper Dik with respect to his current project

        Team: Consult with SMF team

        Need opinion: sanity behind split streams/sockets world

        Need opinion: multiple filter frameworks

Reply via email to