These exact points are explained at the start of the 2012 WWDC sand boxing 
video, which also introduces some of the terminology and thinking behind the 
design. I found that video well worth 45 or so minutes of my life. Won't help 
with the sand boxing bugs but it did give me a better idea of how the Apple 
engineers think about sandboxing and some terms to search the docs for. 



On 4 Sep, 2012, at 6:17 AM, Todd Heberlein <todd_heberl...@mac.com> wrote:

> I suspect the moderator will shut this down as off topic, but I'll reiterate 
> what I've said before.
> 
> On Sep 3, 2012, at 2:58 PM, William Squires <wsqui...@satx.rr.com> wrote:
> 
>> Why should sandboxing on MacOS X even be necessary, seeing as we already 
>> have the Unix file permissions (and ACLs) to handle who can/cannot 
>> read/write to a file or directory?
> 
> Case 1) To prevent your legitimate application with a vulnerability from 
> being used as an attack vector.
> 
> Suppose you write a cool drawing program with your own file format. Your code 
> has a bug when parsing your document. An attacker constructors a malicious 
> document and sends it to one of your users. Your program reads the document, 
> and the malicious document drops a command & control agent on the user's 
> machine.
> 
> This command & control agent has all the privileges you would normally have, 
> so it can send out all your email, all your email attachments, all your Pages 
> and Keynote documents, etc.
> 
> In this way, sandboxing prevents us application developers from being 
> embarrassed by having our code compromise the user. This is probably the 
> primary benefit of sandboxing. You may want to sandbox your code even if you 
> distribute it outside the Mac App Store to avoid the embarrassment of being 
> used as an attack vector.
> 
> I put together a video demonstrating exactly this type of attack (I've posted 
> it here before I think):
> 
>    Glowing Embers: The Myth of the Nation State Requirement
>    http://www.netsq.com/Podcasts/Data/2012/GlowingEmbers/
> 
> 
> Case 2) To prevent a malicious Trojan horse program from compromising the 
> system.
> 
> Despite Apple's review process, they cannot detect malicious code buried 
> inside an application. Once accepted by the Mac App Store and installed on a 
> victim's computer, the evil application could silently (and perhaps slowly to 
> stay below the radar) exfiltrate the user's email, email attachments, Pages, 
> and Keynote documents. Again, it can do this because it runs with all the 
> user's normal privileges, and that is all it needs.
> 
> 
> Todd
> 
> _______________________________________________
> 
> Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)
> 
> Please do not post admin requests or moderator comments to the list.
> Contact the moderators at cocoa-dev-admins(at)lists.apple.com
> 
> Help/Unsubscribe/Update your Subscription:
> https://lists.apple.com/mailman/options/cocoa-dev/rols%40rols.org
> 
> This email sent to r...@rols.org

_______________________________________________

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to