PostgreSQL considers seccomp() filters
PostgreSQL considers seccomp() filters
Posted Oct 2, 2019 3:06 UTC (Wed) by kees (subscriber, #27264)In reply to: PostgreSQL considers seccomp() filters by Cyberax
Parent article: PostgreSQL considers seccomp() filters
Posted Oct 2, 2019 5:50 UTC (Wed)
by mjg59 (subscriber, #23239)
[Link] (4 responses)
Posted Oct 2, 2019 10:51 UTC (Wed)
by brauner (subscriber, #109349)
[Link]
Posted Oct 2, 2019 18:27 UTC (Wed)
by kees (subscriber, #27264)
[Link]
Posted Oct 2, 2019 23:44 UTC (Wed)
by roc (subscriber, #30627)
[Link]
It's not great for performance, but a pledge-like sandboxing library/API can take this approach.
Posted Oct 3, 2019 6:09 UTC (Thu)
by cyphar (subscriber, #110703)
[Link]
If the purpose would be stop malicious programs from doing something bad -- I think it would be more productive to just use mount namespaces and isolate away the rest of the filesystem entirely. Maybe you could make use of path-based filtering in combination with a read-only mount namespace, but I'm still not completely convinced.
If the purpose is to stop a trusted program from being tricked into operating on the wrong kinds of paths by an attacker, I think openat2 and the stuff I'm working on with libpathrs[1] (which takes advantage of existing tricks involving O_PATH and procfs) would be a better solution.
PostgreSQL considers seccomp() filters
PostgreSQL considers seccomp() filters
Not without introducing all kinds of races or moving that part of seccomp into it's own LSM which has it's own problems.
In general path-based filtering seems LSM territory.
However, we intend to bring aspects of deep argument inspection to seccomp eventually.
PostgreSQL considers seccomp() filters
PostgreSQL considers seccomp() filters
PostgreSQL considers seccomp() filters