PostgreSQL considers seccomp() filters
PostgreSQL considers seccomp() filters
Posted Oct 1, 2019 18:42 UTC (Tue) by kfox1111 (subscriber, #51633)Parent article: PostgreSQL considers seccomp() filters
The concern is postgres can be used with arbitrary dependencies and getting a perfect list of what all possible combinations of dependencies with postgres would be next to impossible. That I might agree with.
But, building a container, so that all its dependencies are fixed in stone, then running the test suite on it recording the syscalls would be much more reliable. The syscall list then would be static along with the static container.
Posted Oct 1, 2019 19:56 UTC (Tue)
by dezgeg (subscriber, #92243)
[Link] (2 responses)
Posted Oct 2, 2019 0:31 UTC (Wed)
by kfox1111 (subscriber, #51633)
[Link] (1 responses)
You don't upgrade the contents of a container. You launch an upgraded container.
Posted Oct 25, 2019 5:45 UTC (Fri)
by ssmith32 (subscriber, #72404)
[Link]
Posted Oct 1, 2019 21:29 UTC (Tue)
by nix (subscriber, #2304)
[Link]
Worse yet, PostgreSQL can execute arbitrary syscalls because it can invoke pluggable language interpreters and much else. I see no sane way to sandbox this without a major rearchitecture to move components seen as vulnerable into sandboxable subprocesses that do nothing else -- and even then you'd have the problem that any decent database server with server-side languages is supposed to execute more or less arbitrary code on behalf of users and is useless if it cannot. Diagnosing which arbitrary operations are suspicious and which are not seems a very difficult problem, and one almost certainly unimplementable under the constraints of seccomp sandboxes (which can look at args but cannot dereference pointers if an arg is a pointer, etc).
Posted Oct 2, 2019 0:37 UTC (Wed)
by KaiRo (subscriber, #1987)
[Link] (2 responses)
Posted Oct 2, 2019 0:39 UTC (Wed)
by cyphar (subscriber, #110703)
[Link]
Posted Oct 2, 2019 8:45 UTC (Wed)
by knan (subscriber, #3940)
[Link]
PostgreSQL considers seccomp() filters
PostgreSQL considers seccomp() filters
PostgreSQL considers seccomp() filters
PostgreSQL considers seccomp() filters
running the test suite on it recording the syscalls would be much more reliable.
As was noted, the testsuite doesn't have anything like 100% coverage, particularly of error paths (not even SQLite's manages that, and it goes to incredible lengths to get closer than anyone else I've ever heard of) -- and even if it did, changes in the syscalls used by dependent libraries would break things anyway (this is not academic and has happened multiple times. Heck, it's happened multiple times to me alone, so I'm sure it's downright common for this to go wrong.)
PostgreSQL considers seccomp() filters
PostgreSQL considers seccomp() filters
PostgreSQL considers seccomp() filters