--=_courier-23871-1055322421-0001-2
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable
Hi all,
Please CC me in your replies. (not subscribed to the list)
I am developping a firewall application[1], that filters connections
(besides other informations) on the process which is sending/receiving
the packets. To get the corresponding process name I use the following
method:
1.) i get the ip/port from ip_queue
2.) i search for the inode in /proc/sys/tcp[udp]
3.) i search in /proc/xxx/fd/ for the inode
4.) i get the executeable name by examining /proc/xxx/fd/exe
xxx being all pids in /proc
I just wanted to know if it is possible for a non-root process to
modify:=20
- /proc/PID/exe
- /proc/PID/fd
- /proc/sys/tcp
ie: Is the infomation I get this way reliable or can it be faked.
greetings
Martin Maurer
--=_courier-23871-1055322421-0001-2
Content-Type: application/pgp-signature; name="signature.asc"
Content-Transfer-Encoding: 7bit
Content-Description: This is a digitally signed message part
-----BEGIN PGP MESSAGE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQA+5vEbXHsqb5Up6wURApd6AJ4piqmottbaIrLAQoVqzgy93jhlxQCgg4YX
jwxojWbl1xTGGljSAa29+oI=
=aU2b
-----END PGP MESSAGE-----
--=_courier-23871-1055322421-0001-2--