site_archiver@lists.apple.com Delivered-To: darwin-dev@lists.apple.com Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to :subject:cc:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:references; bh=JZzTiCrD8QjX0+qbVzjGUEsddF4DDGYOS/qzQB15a/c=; b=iP64U6YMDJqWs12xiwfIqr2CsYsZn4SXb7LNM1SozJBnwXGBJxY21nCRifb8EyxNPN Luv1CVUoD8VJyuvj/Os6V+DykyAcHhZuGrHX2akO19pIFFggXhumQ49V+YIYs5tPdImt 9TXTNUfTbU4j2Xd+Z2S7Md7qMMMWx6SqQ8yR8= Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:cc:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :references; b=XPXEAny33RtPVJxMtWhvSe9OYGlNC1h2wV5/XeGK/qUgC7Qt9P8vVtFzzPlMbtVMaq ydV/L3WVzxgF3luqzCJ2jw8m8qMtkp9UW4cciQ0dcsTXW9Qs/r4kuyGfFWHnMUq5XOyk cq/OG25aX2cMoXONeEOiBT1FuBm7BCkDKqj54= On Sat, Nov 15, 2008 at 5:22 AM, Terry Lambert <tlambert@apple.com> wrote:
Maybe you can tell us a little bit more about the program you are trying to attack, and why knowing that it has exitted will facilitate your attack, and how narrow a time window you believe you have before the attack would fail, and we could help you narrow things down.
No attempt to attack anything here... In a nut shell ... we have a small "cluster" of processes that together make up our product. Part of this cluster of processes are launched by a single LaunchDaemon and the other part of this cluster of processes are launched by one or more LaunchAgents (aqua session or pre-login). The launch agent cluster up communicates with the launch daemon, etc. As part of this product we have the concept of processes that depend on other processes and hence need to know when a member of this cluster of processes dies (killed, crashed out, etc.) so we can take action to recover or tear down possibly orphaned processes (and possibly collect crash information). We are evaluating built-in methods to do this process watching as well as looking at methods we can implement using IPC internal to our process cluster. Basically trying to explore the options available while we figure out how best to meld that into our product code base which was originally tooled for Windows. On a side note we plan for all of our processes (executables) to be code signed with using same identity since the cluster of processes together make up on product from the end users point of view. -Shawn _______________________________________________ Do not post admin requests to the list. They will be ignored. Darwin-dev mailing list (Darwin-dev@lists.apple.com) Help/Unsubscribe/Update your Subscription: http://lists.apple.com/mailman/options/darwin-dev/site_archiver%40lists.appl... This email sent to site_archiver@lists.apple.com