[meta] defense in depth for the Linux sandbox (namespaces, chroot)
Categories
(Core :: Security: Process Sandboxing, enhancement)
Tracking
()
People
(Reporter: danielmicay, Assigned: jld)
References
(Depends on 1 open bug, Blocks 1 open bug)
Details
(Keywords: meta)
| Reporter | ||
Comment 1•11 years ago
|
||
| Assignee | ||
Comment 3•11 years ago
|
||
| Assignee | ||
Comment 4•11 years ago
|
||
| Reporter | ||
Comment 5•11 years ago
|
||
| Assignee | ||
Comment 6•11 years ago
|
||
| Assignee | ||
Comment 7•11 years ago
|
||
| Assignee | ||
Comment 8•11 years ago
|
||
| Assignee | ||
Comment 9•11 years ago
|
||
| Assignee | ||
Updated•11 years ago
|
| Assignee | ||
Comment 10•10 years ago
|
||
| Assignee | ||
Updated•10 years ago
|
| Assignee | ||
Comment 11•10 years ago
|
||
Updated•10 years ago
|
Updated•8 years ago
|
Updated•3 years ago
|
Comment 12•8 months ago
|
||
A newer Linux feature which may be worth investigating is Landlock: https://docs.kernel.org/userspace-api/landlock.html
This API provides the ability to lock down access to Filesystem, Network, Abstract unix sockets, and Signals in an unrevokable way without requiring special privileges or the ability to use namespaces/chroot.
In particular, Landlock can be used when Firefox is running as a Flatpak, where namespaces cannot be used.
I don't think it would be suitable as a complete replacement for namespaces - at least not for the time being. Landlock is a very new feature, and might not yet be available in distribution kernels; Landlock ABI 4 which added support for locking down network access was introduced in Linux 6.7, while LTS distributions are often still on older releases, for example.
But I think it would make sense to use Landlock when available to add defence in depth, especially for users of Flatpak Firefox.
Comment 13•4 months ago
|
||
(In reply to Jed Davis [:jld] ⟨⏰|UTC-7⟩ ⟦he/him⟧ from comment #11)
This is now a meta bug, because it covers lots of things that aren't all
going to be done at once.
Is this more an enhancement than a defect? Do we expect more things to be added here than bug 1151624 ?
| Assignee | ||
Comment 14•4 months ago
|
||
(In reply to Jens Stutte [:jstutte] from comment #13)
Is this more an enhancement than a defect? Do we expect more things to be added here than bug 1151624 ?
This does seem more like an enhancement. (Also this bug might be older than the Type field….)
Other than bug 1151624, the Landlock LSM mentioned in comment #12 looks interesting as an extra layer of defense; that doesn't have a bug yet but I can file one. (Aside from being a relatively new feature, it has nothing equivalent to SECCOMP_FILTER_FLAG_TSYNC so I'd need to do something with this code I wrote in 2014 that I was hoping to get rid of someday.) In theory there could be other things in the future that might fall into that general category. This meta-bug was originally only about namespaces, but at the time there wasn't really anything else that restricted the semantics of operations, so it's not too much of a reach to include something like Landlock.
Description
•