Open
Bug 942695
(desktop-seccomp-ongoing)
Opened 11 years ago
Updated 2 years ago
[meta] Tracking bug for tightening the seccomp-bpf whitelist for Linux Desktop
Categories
(Core :: Security: Process Sandboxing, defect)
Tracking
()
NEW
People
(Reporter: ckerschb, Unassigned)
References
Details
(Keywords: meta)
Currently the seccomp filter sandboxing uses to allow syscalls [1] relies on a very open whitelist that allows to run firefox using that sandbox. Over time, we want to eliminate dangerous syscalls from that whitelist; definitely the following (probably even more): open prctl access unlink fsync socketpair sendmsg socket chmod execve rename symlink connect quotactl kill sendto For more information, please also see [2]. [1] http://mxr.mozilla.org/mozilla-central/source/security/sandbox/linux/seccomp_filter.h [2] https://wiki.mozilla.org/FoxInABox
Reporter | ||
Comment 1•11 years ago
|
||
Probably obvious, but mentioning the steps to get started to work on sandboxing for linux desktop: > Update your .mozconfig and add those two lines: ac_add_options --enable-content-sandbox ac_add_options --enable-content-sandbox-reporter > Enable e10s. Do this in about:config by setting: browser.tabs.remote = true; then restart your browser. > You can apply the following patch to send the child process to sleep for 120 seconds. Use the 'ps' command to find the process Id, and then attach gdb once the process wakes up. --- a/security/sandbox/linux/Sandbox.cpp +++ b/security/sandbox/linux/Sandbox.cpp @@ -138,16 +138,21 @@ InstallSyscallFilter(void) { if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) { return 1; } if (prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &seccomp_prog, 0, 0)) { return 1; } + + printf("\n\n going to sleep...\n\n"); + sleep(120); + printf("\n\n waking up ...\n\n"); + return 0; }
Comment 2•9 years ago
|
||
Move process sandboxing bugs to their new, separate component. (Sorry for the bugspam; filter on 3c21328c-8cfb-4819-9d88-f6e965067350.)
Component: Security → Security: Process Sandboxing
Updated•9 years ago
|
Depends on: desktop-seccomp
Updated•4 years ago
|
Summary: Tracking bug for tightening the seccomp-bpf whitelist for Linux Desktop → [meta] Tracking bug for tightening the seccomp-bpf whitelist for Linux Desktop
Updated•2 years ago
|
Severity: normal → S3
You need to log in
before you can comment on or make changes to this bug.
Description
•