Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sandboxing on other platforms #181

Open
clemensg opened this issue Dec 10, 2015 · 1 comment
Open

Sandboxing on other platforms #181

clemensg opened this issue Dec 10, 2015 · 1 comment

Comments

@clemensg
Copy link

Hi,

what do you think about reducing the attack surface on OS X as well (and not only on Linux with seccomp) ?

There is a "sandbox facility" in OS X:

SANDBOX(7)           BSD Miscellaneous Information Manual           SANDBOX(7)

NAME
     sandbox -- overview of the sandbox facility

SYNOPSIS
     #include <sandbox.h>

DESCRIPTION
     The sandbox facility allows applications to voluntarily restrict their access to
     operating system resources.  This safety mechanism is intended to limit potential
     damage in the event that a vulnerability is exploited.  It is not a replacement for
     other operating system access controls.

     New processes inherit the sandbox of their parent.  Restrictions are generally
     enforced upon acquisition of operating system resources only.  For example, if file
     system writes are restricted, an application will not be able to open(2) a file for
     writing.  However, if the application already has a file descriptor opened for writ-
     ing, it may use that file descriptor regardless of restrictions.

SEE ALSO
     sandbox-exec(1), sandbox_init(3), sandboxd(8)

Mac OS X                       January 29, 2010                       Mac OS X

We could probably also take other ideas and code from Chrome? https://www.chromium.org/developers/design-documents/sandbox/osx-sandboxing-design

What do you think? Ideas, suggestions?

Cheers,
Clemens

@ioerror
Copy link
Owner

ioerror commented Dec 10, 2015

On 12/10/15, Clemens Gruber [email protected] wrote:

Hi,

what do you think about reducing the attack surface on OS X as well (and not
only on Linux with seccomp) ?

There is a "sandbox facility" in OS X:

SANDBOX(7)           BSD Miscellaneous Information Manual
SANDBOX(7)

NAME
     sandbox -- overview of the sandbox facility

SYNOPSIS
     #include <sandbox.h>

DESCRIPTION
     The sandbox facility allows applications to voluntarily restrict their
access to
     operating system resources.  This safety mechanism is intended to limit
potential
     damage in the event that a vulnerability is exploited.  It is not a
replacement for
     other operating system access controls.

     New processes inherit the sandbox of their parent.  Restrictions are
generally
     enforced upon acquisition of operating system resources only.  For
example, if file
     system writes are restricted, an application will not be able to
open(2) a file for
     writing.  However, if the application already has a file descriptor
opened for writ-
     ing, it may use that file descriptor regardless of restrictions.

SEE ALSO
     sandbox-exec(1), sandbox_init(3), sandboxd(8)

Mac OS X                       January 29, 2010                       Mac OS
X

We could probably also take other ideas and code from Chrome?
https://www.chromium.org/developers/design-documents/sandbox/osx-sandboxing-design

What do you think? Ideas, suggestions?

I'd very much like to use OS X sandboxing. I don't have a Mac OS X
device that would be useful here. If you want to submit a patch, we
can have someone else help with the review, I'm open to reviewing it
also.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants