From: Fabian K. <fab...@le...> - 2012-03-09 16:34:49
|
Hi Heiko, Am 9. März 2012 14:42 schrieb Heiko Hund <hei...@so...>: > Instead I plan to secure the process (and the probably the pipe handle as > well) against malicious operations by not granting the user any sophisticated > access to it, i.e. you can only inject code if you can write the process' > memory. This will be enforced by the security descriptor assigned to the > process by the service at creation time. The service account will own the > process object, so that the user cannot sneak his way in by modifying the > DACL. As I'm not very familiar with the Windows nomenclature, I'm not sure whether I've correctly understood what you're saying. Does your approach prevent the user from injecting code into the OpenVPN process? Or does it only prevent the user from directly accessing the pipe? (IIUC you would need the integrity level approach to prevent the former so I assume you're describing how the pipe handle will be protected instead.) Cheers Fabian |