A Highly Portable Sandbox Facility For OpenBSD 40
An Anonymous Coward writes: "A new facility called 'systrace' has been developed by one of the OpenBSD developers. It allows enforcement of system call policies on untrusted binaries. For now it is only available OpenBSD-current, but the author claims it is highly portable and can easily be integrated into GNU/Linux systems. Eventually binary-only software is going to become more and more common in Linux, so this could be a another 'Good Thing(TM)' from the paranoids that brought us OpenSSH."
What's the overhead? (Score:3, Insightful)
Re:What's the overhead? (Score:3, Informative)
Re:What's the overhead? (Score:1)
system calls are made and then inspect the registers to see what the arguments to the system call are. This would naturally result in extra context switching every time a system call is made, but it is very simple and keeps the added complexity outside of the kernel.
Re:BSD vs. Linux (Score:2, Funny)
Lucent? (Score:1)
Re:Lucent? (Score:2)
No, that's not even close. This monitors what the program is attempting to access, not monitoring buffers, return values, etc. Very different.
Great news! (Score:2, Interesting)
With this mechanism, basically every program can be sandboxed. Basically it would be very useful to restrict the access to the filesystem: applications do not need to access certain directories, or even better they should only access
Still the permissions should be defined mainly at system level: for example the mozilla binary must not be allowed to access
Re:Great news! (Score:2, Informative)
Re:Great news! (Score:2)
Hope you either use a http proxy or always type in IP addresses, or else you wont be surfing the web any more.
Re:Great news! (Score:2)
How does this compare to Jail? (Score:2, Interesting)
I've messed around with jail in FreeBSD and see there is a porting to Linux. Nice to see this in OpenBSD. Hey Microsoft, what have you got?
Re:How does this compare to Jail? (Score:1, Funny)
Running programs as SYSTEM makes them fast!
Whoops!
Where's all my files!
I are hacked!
Re:How does this compare to Jail? (Score:2, Insightful)
It means running without local security restrictions, and is precisely equivalent to running things as root. Administrator has reduced privilages compared to root or System.
The main (only?) reason to do this is if you need to do things with the privilages of other users, and even here NT provides proper impersonation facilities, so that's largely unneccessary if you are using an NT-supported authentication system, such as NTCR or X509 (I don't have a complete list, but you can write your own, like PAM in Linux -- if you trust yourself).
Also, FYI:
Internet Explorer runs neither in Kernel Space (I assume you mean kernel mode) nor as System, but as a user-mode process with the privilages of the user who started it.
The default installation of IIS has not run as System for about four years (maybe more, not sure, but at least four). Now it runs as IUSR_, which is a normal user and uses impersonation to check for file access privilages.
I don't know about Exchange, but I would be surprised if it ran a system these days.
Re:How does this compare to Jail? (Score:2, Informative)
(FWIW, a Job object is a container for processes which can impose multiple restrictions on all children. Obvious, overdue stuff such as memory and processor quotas are included, but so is the ability to restrict which USER (windowing) objects a process can have access to. In principle this allows you to run untrusted GUI apps with lower privilages without the DOS/intrustion problems that come from features such as the clipboard, DDE, COM and so forth. Unfortunately you have to do this programattically, and MS don't appear to have done anything much with it yet from the perspective of the end user).
And of course system calls have always had restrictions on them, (though not on a per-function basis) via user rights.
Could be a long time comming (Score:1)
Re:Could be a long time comming (sic) (Score:1)
IMHO, however, I almost always compile from source, especially with a new piece of software, though if you're running less powerful hardware it can be a bit of a drag.
Cool, but... (Score:1)
been done... (Score:1)
security in BSD (Score:1)
As for binary-only software in Linux, I don't believe the number of binary only applications will increase very much more other than commercial or restricted licensed apps.
Thank God (Score:1)
"it is highly portable and can easily be integrated into GNU/Linux systems"
Otherwise it wouldn't be newsworthy.
Highly portable? (Score:2)