Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 24 Apr 2013 09:37:14 -0400
From: Rich Felker <dalias@...ifal.cx>
To: musl@...ts.openwall.com
Subject: Re: Best place to discuss other lightweight libraries?

On Wed, Apr 24, 2013 at 12:43:06AM -0400, Kurt H Maier wrote:
> In fact, I'm firmly of the opinion that complete signal loss is the
> *only* time a system should monkey with the network; one of my least
> favorite things is my phone aggressively dropping 3G so it can switch
> to wifi, dumping my ssh sessions and filesystem mounts in the process. 

Ideally it would keep using both as long as there were some
"important" connections persisting on the old one, and there would be
a socket option for applications using unimportant persistent
connections to flag them unimportant.

> > Agree, but it still needs to be solved, even if the solution requires
> > frequent updates to be fully effective. With decent heuristics though
> > I think it could be fully automated for most sites with just a few
> > exceptions for really weird ones..
> 
> I think the ideal solution is for network administrators to stop
> pretending hijacking sessions is acceptable, but until an automated
> solution exists I enjoy all the hate they get from users.

Maybe once everyone finishes switching to https...then the hijacking
will cease to work, and to give a reasonable user experience, they'll
have to drop hijacking.

> > Agreed. I think really most users should _always_ be running in an
> > environment where only root sees the real network interfaces and
> > applications just see a virtual network routed through the real one.
> 
> This doesn't necessarily solve anything from the user's standpoint
> unless he's trained to use the feature appropriately, but it would

The assumption is that the system software, possibly interacting with
the user if the user were allowed to change network settings, would
handle the status of the real connection, and expose it only though
the virtual interface through the user when it's actually working. For
semi-advanced users, this could allow transparent migration (even
keeping your ssh/chat/etc. sessions) if you integrate it with vpn.

Rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.