Priviledge Seperation
Priviledge Seperation
Posted Dec 10, 2015 12:35 UTC (Thu) by pwfxq (subscriber, #84695)Parent article: Wireshark 2.0: Now with Qt
      Posted Dec 10, 2015 13:00 UTC (Thu)
                               by NAR (subscriber, #1313)
                              [Link] 
       
     
      Posted Dec 10, 2015 13:14 UTC (Thu)
                               by pizza (subscriber, #46)
                              [Link] (1 responses)
       
     
    
      Posted Dec 12, 2015 9:18 UTC (Sat)
                               by Lekensteyn (guest, #99903)
                              [Link] 
       
     
      Posted Dec 10, 2015 13:20 UTC (Thu)
                               by jlayton (subscriber, #31672)
                              [Link] 
       
     
      Posted Dec 10, 2015 17:59 UTC (Thu)
                               by iabervon (subscriber, #722)
                              [Link] (3 responses)
       
 
     
    
      Posted Dec 10, 2015 20:00 UTC (Thu)
                               by bronson (subscriber, #4806)
                              [Link] (2 responses)
       
I assume the catch is that Wireshark is cross-platform and sandboxing is not.  Very very not. 
     
    
      Posted Dec 10, 2015 22:33 UTC (Thu)
                               by johill (subscriber, #25196)
                              [Link] (1 responses)
       
I think the cross-platform angle seems a bit of a red herring; once you've split it out to a separate process you could get the security where it's supported? 
     
    
      Posted Dec 11, 2015 15:27 UTC (Fri)
                               by raven667 (subscriber, #5198)
                              [Link] 
       
It seems you only need a file descriptor in/out, input would be pcap data, output would have to be structured for consumption by the Wireshark UI, which provides its own attack surface and potential for failure, but it should be lower than that of the dissectors themselves, even as the dissectors are re-written in a safer way.  How is that done in browser land, what validation does the display process have of data being fed from the parser? 
     
      Posted Dec 11, 2015 7:34 UTC (Fri)
                               by robbe (guest, #16131)
                              [Link] (1 responses)
       
More interesting at the moment would be privilege-seperating the dissectors from the GUI. They are a prime example where even simple seccomp could do wonders. 
     
    
      Posted Dec 12, 2015 19:18 UTC (Sat)
                               by jmayer (guest, #595)
                              [Link] 
       
     
    Priviledge Seperation
      
Priviledge Seperation
      
Priviledge Seperation
      
Priviledge Seperation
      
Priviledge Seperation
      
Priviledge Seperation
      
Priviledge Seperation
      
Seriously though - it could probably be done since the dissectors interact with an abstract representation of the parse tree, but you'd have to serialize that across some kind of protocol which is likely quite awful ...
Priviledge Seperation
      
Privilege Seperation
      
Privilege Seperation
      
 
           