Make D-Bus implementations return a file descriptor
pinning the process as part of the credentials on
platforms that implement such concept, like Linux.
Pinning the process allows to defend against PID
reuse attacks, making authentication by
service/cgroup possible.
Signed-off-by: Luca Boccassi <bluca@debian.org>
to the dictionary.
</entry>
</row>
+ <row>
+ <entry>ProcessFD</entry>
+ <entry>UNIX_FD</entry>
+ <entry>A file descriptor pinning the process, on platforms
+ that have this concept. On Linux, the SO_PEERPIDFD socket
+ option is a suitable implementation. This is safer to use
+ to identify a process than the <literal>ProcessID</literal>,
+ as the latter is subject to re-use attacks, while the FD
+ cannot be recycled. If the original process no longer exists
+ the FD will no longer be resolvable.</entry>
+ </row>
<row>
<entry>ProcessID</entry>
<entry>UINT32</entry>