Re: seccomp support [was: Testing chrony seccomp support]

2016-01-19 Thread Michael Catanzaro
On Tue, 2016-01-19 at 10:16 +0100, Nikos Mavrogiannopoulos wrote: > The issue is that blacklists are terrible from a security standpoint. > That means that every new obscure system call added to the kernel > will > be available by default in your program. Yes. This implies that seccomp should not

Re: seccomp support [was: Testing chrony seccomp support]

2016-01-19 Thread Michael Catanzaro
On Tue, 2016-01-19 at 08:08 -0800, Andrew Lutomirski wrote: > One of these days I need to tidy up Sandstorm's seccomp policy and > factor > it into its own library.  It's made a good showing for itself over > the last > year or so, and it's highly compatible. I would be quite interested in this!

Re: seccomp support [was: Testing chrony seccomp support]

2016-01-19 Thread Colin Walters
On Tue, Jan 19, 2016, at 11:08 AM, Andrew Lutomirski wrote: > > On Jan 19, 2016 7:41 AM, "Colin Walters" wrote: > > > > > > > > On Tue, Jan 19, 2016, at 04:16 AM, Nikos Mavrogiannopoulos wrote: > > > > > The issue is that blacklists are terrible from a security > > standpoint. > > > That means tha

Re: seccomp support [was: Testing chrony seccomp support]

2016-01-19 Thread Andrew Lutomirski
On Jan 19, 2016 7:41 AM, "Colin Walters" wrote: > > > > On Tue, Jan 19, 2016, at 04:16 AM, Nikos Mavrogiannopoulos wrote: > > > The issue is that blacklists are terrible from a security standpoint. > > That means that every new obscure system call added to the kernel will > > be available by defau

Re: seccomp support [was: Testing chrony seccomp support]

2016-01-19 Thread Colin Walters
On Tue, Jan 19, 2016, at 04:16 AM, Nikos Mavrogiannopoulos wrote: > The issue is that blacklists are terrible from a security standpoint. > That means that every new obscure system call added to the kernel will > be available by default in your program. https://github.com/seccomp/libseccomp/iss