search for: systrace

Displaying 20 results from an estimated 39 matches for "systrace".

2011 Aug 14
10
Call for testing: OpenSSH-5.9
...he privsep child can perform. This intention is to prevent a compromised privsep child from being used to attack other hosts (by opening sockets and proxying) or probing local kernel attack surface. Three concrete sandbox implementation are provided (selected at configure time): systrace, seatbelt and rlimit. The systrace sandbox uses systrace(4) in unsupervised "fast-path" mode, where a list of permitted syscalls is supplied. Any syscall not on the list results in SIGKILL being sent to the privsep child. Note that this requires a kernel with the new SYSTR_PO...
2003 Jul 25
3
systrace for FreeBSD 5.1
I'm porting the most recent version of Neil Provos' systrace to FreeBSD 5.1. I'm sending him the diffs to integrate into his distribution. I'd also like to submit them to someone with FreeBSD for consideration, and hopefully inclusion as a port or whatever you prefer. Who could I send them to, or what would you prefer me to do with regard to FreeBS...
2006 Apr 05
23
DTrace as a security tool / http://systrace.org
I''d like to see if we can use DTrace to as the kernel implementation of the BSD systrace security policy system (http://www.systrace.org). I don''t really want to port systrace to Solaris because I think with DTrace we already have all the necessary in kernel hooks to do this. With systrace you express things like: "httpd can bind to port 80 but not any other port, it...
2007 Aug 09
9
Is DTrace Vulnerable?
There is a Slashdot discussion today titled "Cambridge Researcher Breaks OpenBSD Systrace". Slashdot anonymous member has a comment "Even Sun''s Dtrace might be vulnerable." I don''t think it is. Comments? Exploiting Concurrency Vulnerabilities in System Call Wrappers http://www.watson.org/~robert/2007woot/2007usenixwoot-exploitingconcurrency.pdf Abs...
2011 Jun 22
3
sandbox pre-auth privsep child
...it has been used by Chris Evans' vsftpd FTP server and, more recently, by Google's Chrome web browser. This patch includes three concrete sandbox implementations, a dummy one for platforms that support nothing else, a weak one that uses setrlimit(2) and a strong one that uses OpenBSD's systrace(4). The setrlimit(2) sandbox drops the hard and soft fd, process and "created file size" limits to zero. This effectively prevents the slave process from forking or creating new file descriptors (e.g. sockets). This works well suprisingly well on most platforms at preventing a compromise...
2011 Jun 23
1
sandbox for OS X
Hi, The systrace and rlimit sandboxes have been committed and will be in snapshots dated 20110623 and later. This diff adds support for pre-auth privsep sandboxing using the OS X sandbox_init(3) service. It's a bit disappointing that the OS X developers chose such as namespace-polluting header and function nam...
2006 Jun 03
1
man pages for each providers ?
...fbt fbt (7d) - DTrace function boundary tracing provider lockstat lockstat (7d) - DTrace kernel lock instrumentation provider profile profile (7d) - DTrace profile interrupt provider sdt sdt (7d) - DTrace statically defined tracing provider systrace systrace (7d) - DTrace system call tracing provider Can we have as well the probes available by each provder defined in each manual page ? Is there a RFE already opened ? Thanks, stefan This message posted from opensolaris.org
2005 Oct 11
7
dtrace: failed to initialize dtrace: DTrace device not available on system
...0:fbt", O_RDONLY) Err#2 ENOENT open("/devices/pseudo/lockstat at 0:lockstat", O_RDONLY) Err#2 ENOENT open("/devices/pseudo/profile at 0:profile", O_RDONLY) Err#2 ENOENT open("/devices/pseudo/sdt at 0:sdt", O_RDONLY) Err#2 ENOENT open("/devices/pseudo/systrace at 0:systrace", O_RDONLY) Err#2 ENOENT And i confirm these devices dont exist in any of the production or staging servers which have the minimized set of packages. anyone have an idea what we have setup wrong? and when i run a truss on dtrace i see it errors with not found for all the devi...
2004 Jul 29
2
Samba 3.0.x and high processor utilication caused by /etc/passwd access
Hello together, since upgrading on samba 3.0.x (issue happens with all 3.0. release) the cpu-load on my samba PDC ist constantly near 100%. The cpu power ist consumed by all running smb-processes. Systrace shows me that the smb processes tried to access to /etc/passwd on a permanent basis. My question is: Why tries samba to access etc/passwd so often and produces this high cpu-load? Regards, Heiko B?ringer Rights for smbpasswd are set as following ###################################################...
2011 Sep 06
2
Announce: OpenSSH 5.9 released
...he privsep child can perform. This intention is to prevent a compromised privsep child from being used to attack other hosts (by opening sockets and proxying) or probing local kernel attack surface. Three concrete sandbox implementation are provided (selected at configure time): systrace, seatbelt and rlimit. The systrace sandbox uses systrace(4) in unsupervised "fast-path" mode, where a list of permitted syscalls is supplied. Any syscall not on the list results in SIGKILL being sent to the privsep child. Note that this requires a kernel with the new SYSTR_PO...
2011 Sep 06
2
Announce: OpenSSH 5.9 released
...he privsep child can perform. This intention is to prevent a compromised privsep child from being used to attack other hosts (by opening sockets and proxying) or probing local kernel attack surface. Three concrete sandbox implementation are provided (selected at configure time): systrace, seatbelt and rlimit. The systrace sandbox uses systrace(4) in unsupervised "fast-path" mode, where a list of permitted syscalls is supplied. Any syscall not on the list results in SIGKILL being sent to the privsep child. Note that this requires a kernel with the new SYSTR_PO...
2005 Aug 23
0
Duplication in dtrace''s forceload entries in /etc/system
...tion, but tracing will not occur during boot as desired. * To remove these directives (and this block comment) automatically, run * "dtrace -A" without additional arguments. See the "Anonymous Tracing" * chapter of the Solaris Dynamic Tracing Guide for details. * forceload: drv/systrace forceload: drv/sdt forceload: drv/profile forceload: drv/lockstat forceload: drv/fbt forceload: drv/fasttrap forceload: drv/systrace forceload: drv/sdt forceload: drv/profile forceload: drv/lockstat forceload: drv/fbt forceload: drv/fasttrap forceload: drv/dtrace * ^^^^ Added by DTrace It'...
2005 Oct 10
1
Dovecot versus libsafe 2.0.15
Hi, I encountered a problem using Dovecot (todays CVS, 11/10/2005) with libsafe, systemwide install. Dovecot silently dies. Here is the end of the systrace output I got: bind(6, {sin_family=AF_INET, sin_port=htons(143), sin_addr=inet_addr("0.0.0.0")}}, 16) = 0 getsockname(6, {sin_family=AF_INET, sin_port=htons(143), sin_addr=inet_addr("0.0.0.0")}}, [16]) = 0 listen(6, 8) = 0 fcntl64(0x6, 0x3, 0, 0x8072...
2011 Sep 26
1
Firewalling outbound connections...
Hi, would anyone know a soft to firewall outbound connections (applications phoning home, etc...). It would detect an unknown (to him) app that tries to connect to the outside world and it would popup a allow/deny request...AppArmor might be a bit overkill... Anyone have any experience with Systrace, TuxGuardian or Zorp GPL...? Thx, JD
2014 Feb 28
5
Call for testing: OpenSSH 6.6
...gives 'Host' and 'Match' directives that use the expanded hostname a chance to be applied. Bugfixes: * ssh(1): avoid spurious "getsockname failed: Bad file descriptor" in ssh -W. bz#2200, debian#738692 * sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace sandbox modes, as it is reachable if the connection is terminated during the pre-auth phase. * ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum parsing. Minimum key length checks render this bug unexploitable to compromise SSH 1 sessions. * sshd_config(5): clarif...
2012 Dec 20
4
Deprecated calls to bzero() and index() found in OpenSSH 6.1p1
...288,7 +2288,7 @@ JPAKE_DEBUG_CTX((pctx, "check_confirm done in %s", __func__)); - bzero(peer_confirm_hash, peer_confirm_hash_len); + memset(peer_confirm_hash, 0, peer_confirm_hash_len); xfree(peer_confirm_hash); buffer_clear(m); In file 'sandbox-systrace.c', I've replaced the bzero() call with the equivalent memset() call. The patch file is below in (diff -u) format: --- sandbox-systrace.c.orig 2012-12-19 17:27:48.258532654 -0800 +++ sandbox-systrace.c 2012-12-19 17:28:12.705825672 -0800 @@ -140,7 +140,7 @@ box-&g...
2011 Aug 17
1
openssh-unix-dev Digest, Vol 100, Issue 3
...perform. > This intention is to prevent a compromised privsep child from being > used to attack other hosts (by opening sockets and proxying) or probing > local kernel attack surface. > > Three concrete sandbox implementation are provided (selected at > configure time): systrace, seatbelt and rlimit. > > The systrace sandbox uses systrace(4) in unsupervised "fast-path" > mode, where a list of permitted syscalls is supplied. Any syscall not > on the list results in SIGKILL being sent to the privsep child. Note > that this requires a kernel w...
2012 Dec 21
0
File Attachments for previous bug report
...88,7 @@ JPAKE_DEBUG_CTX((pctx, "check_confirm done in %s", __func__)); - bzero(peer_confirm_hash, peer_confirm_hash_len); + memset(peer_confirm_hash, 0, peer_confirm_hash_len); xfree(peer_confirm_hash); buffer_clear(m); -------------- next part -------------- --- sandbox-systrace.c.orig 2012-12-19 17:27:48.258532654 -0800 +++ sandbox-systrace.c 2012-12-19 17:28:12.705825672 -0800 @@ -140,7 +140,7 @@ box->systrace_fd, child_pid, strerror(errno)); /* Allocate and assign policy */ - bzero(&policy, sizeof(policy)); + memset(&policy, 0, sizeof(policy)...
2015 Jun 29
3
[Bug 2419] New: SECCOMP filter does not accept getpgid syscall
https://bugzilla.mindrot.org/show_bug.cgi?id=2419 Bug ID: 2419 Summary: SECCOMP filter does not accept getpgid syscall Product: Portable OpenSSH Version: 6.8p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: sshd Assignee: unassigned-bugs at
2014 Mar 15
0
Announce: OpenSSH 6.6 released
...gives 'Host' and 'Match' directives that use the expanded hostname a chance to be applied. Bugfixes: * ssh(1): avoid spurious "getsockname failed: Bad file descriptor" in ssh -W. bz#2200, debian#738692 * sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace sandbox modes, as it is reachable if the connection is terminated during the pre-auth phase. * ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum parsing. Minimum key length checks render this bug unexploitable to compromise SSH 1 sessions. * sshd_config(5): clarif...