Re: not exactly (Re: systrace removed? Why?)

2016-09-03 Thread Michal Bozon
if someone's interested, here a list of fs differences between 6.0 upgraded from 5.9, and 6.0 install, i found, with some obvious differences like smtpd spool or sysmerge backups removed (amd64/qemu): http://pastebin.com/raw/VPkdbvxy (text/plain) (not pasting because of long lines) hth

Re: not exactly (Re: systrace removed? Why?)

2016-09-03 Thread Edgar Pettijohn
Sent from my iPhone On Sep 3, 2016, at 12:46 PM, Michal Bozon wrote: >> good(?) news: sysmerge is gone in 6.0 >> but not removed by 5.9 to 6.0 uprade process. > > s/sysmerge/systrace/ > pledge()

Re: not exactly (Re: systrace removed? Why?)

2016-09-03 Thread Michal Bozon
> > good(?) news: sysmerge is gone in 6.0 > > but not removed by 5.9 to 6.0 uprade process. > > > > I really have a hard time understanding what you're trying to point out. > > Yes, systrace is gone, but it's an ordinary binary that does no harm, >

Re: not exactly (Re: systrace removed? Why?)

2016-09-03 Thread Michal Bozon
> good(?) news: sysmerge is gone in 6.0 > but not removed by 5.9 to 6.0 uprade process. s/sysmerge/systrace/

Re: not exactly (Re: systrace removed? Why?)

2016-09-03 Thread Theo Buehler
On Sat, Sep 03, 2016 at 05:37:22PM +, Michal Bozon wrote: > > Why? > > good(?) news: sysmerge is gone in 6.0 > but not removed by 5.9 to 6.0 uprade process. > I really have a hard time understanding what you're trying to point out. Yes, systrace is gone, but it&#x

not exactly (Re: systrace removed? Why?)

2016-09-03 Thread Michal Bozon
> Why? good(?) news: sysmerge is gone in 6.0 but not removed by 5.9 to 6.0 uprade process.

Re: systrace removed? Why?

2016-04-27 Thread Christian Weisgerber
On 2016-04-27, Marc Espie wrote: > Race-conditiony things that make you go hum, oh shit is this thing > more dangerous than what it's actually potecting. Plus semantic bugs. > Like the time we had to hunt a really weird copy bug in the qt code until > we realized it was just sy

Re: systrace removed? Why?

2016-04-27 Thread Marc Espie
There were some significant issues with systrace over the years. Race-conditiony things that make you go hum, oh shit is this thing more dangerous than what it's actually potecting. Plus semantic bugs. Like the time we had to hunt a really weird copy bug in the qt code until we realized i

Re: systrace removed? Why?

2016-04-26 Thread Kevin Chadwick
> it is not important. > > systrace was effectively deprecated 4-10 years ago, when there stopped > being a maintainer for it, or the broken ecosystem surrounding. > > That was a gap needed to consider a replacement model. > > What do you want here? I guess nothing imp

Re: systrace removed? Why?

2016-04-26 Thread Theo de Raadt
>> how do you mean? what happens on 5.9 when you use systrace with pledged >> programs? Does cpu usage go through the roof by any chance? That would >> explain why I have had to disable it to avoid waiting so long for >> systraced desktop programs. > >hmmm, actually I

Re: systrace removed? Why?

2016-04-26 Thread Theo de Raadt
>> > Unfortunately systrace overhead can be significant for monitoring >> > complex programs but it could potentially be useful as a part of a >> > (HIPS or system intrusion or malfunction detection for a secure >> > server). hmmm, assuming pledge does

Re: systrace removed? Why?

2016-04-26 Thread Kevin Chadwick
> how do you mean? what happens on 5.9 when you use systrace with pledged > programs? Does cpu usage go through the roof by any chance? That would > explain why I have had to disable it to avoid waiting so long for > systraced desktop programs. hmmm, actually I guess the claws-mail

Re: systrace removed? Why?

2016-04-26 Thread Kevin Chadwick
> > Unfortunately systrace overhead can be significant for monitoring > > complex programs but it could potentially be useful as a part of a > > (HIPS or system intrusion or malfunction detection for a secure > > server). hmmm, assuming pledge doesn't kill the offe

Re: systrace removed? Why?

2016-04-26 Thread Theo de Raadt
> > I guess the question is: how many people actually use systrace in > > scripts? Probably very very few. >From yesterday onwards, noone uses it. > I use it in scripts but will look to switching to pledge when I > have time, which I *should* be able to find in the next 6

Re: systrace removed? Why?

2016-04-26 Thread Kevin Chadwick
> I guess the question is: how many people actually use systrace in > scripts? Probably very very few. I use it in scripts but will look to switching to pledge when I have time, which I *should* be able to find in the next 6 months, haha. It is however sometimes insightful as a quick and

Re: systrace removed? Why?

2016-04-26 Thread Stuart Henderson
On 2016-04-26, arrowscr...@mail.com wrote: > Of course, you can put it on packages Nope.

Re: systrace removed? Why?

2016-04-25 Thread Michael McConville
arrowscr...@mail.com wrote: > I know about the pledge(2) development, but systrace and pledge are > not mutually exclusive. Pledge need to be used inline, where systrace > can be used as a command line tool. > > If you remove it, many scripts that use systrace for privilege &

Re: systrace removed? Why?

2016-04-25 Thread arrowscript
I know about the pledge(2) development, but systrace and pledge are not mutually exclusive. Pledge need to be used inline, where systrace can be used as a command line tool. If you remove it, many scripts that use systrace for privilege reduction will broke. Of course, you can put it on

Re: systrace removed? Why?

2016-04-25 Thread Luis Coronado
Why not? In a more serious way, read misc@ and tech@ particuarly in the subject about pledge. -luis On Monday, 25 April 2016, wrote: > Why?

systrace removed? Why?

2016-04-25 Thread arrowscript
Why?

Re: "# systrace -c1000:1000 kate" for privilege escalated editing?

2015-12-04 Thread Luke Small
>I can't quite figure out what you're trying to do, but running big GUI >programs and libraries with root privileges (whether that's from systrace or >doas or sudo or su or whatever) is usually not a good idea. Thinking about it now, I guess if you add root write privileg

Re: "# systrace -c1000:1000 kate" for privilege escalated editing?

2015-12-04 Thread Stuart Henderson
On 2015-12-03, Luke Small wrote: > I want to be able to use systrace for privilege escalation for kompare for > sysmerge diffs and kate. Why isn't systrace able to do this? I can't quite figure out what you're trying to do, but running big GUI programs and libraries with roo

Re: "# systrace -c1000:1000 kate" for privilege escalated editing?

2015-12-03 Thread Janne Johansson
2015-12-04 0:10 GMT+01:00 Luke Small : > There must be some sort of kernel lock, because if you su - twice into the > 1000 user, it won't open a x window either! I'm sure there is a > conservative security policy at play, X and switching users requires you to read up on xauth, always has. --

Re: "# systrace -c1000:1000 kate" for privilege escalated editing?

2015-12-03 Thread Luke Small
write a program that doesn't suid but can open a privileged socket under systrace -c 1000:1000 ./server On Dec 2, 2015 19:44, "Vadim Zhukov" wrote: > 03 дек. 2015 г. 4:27 пользователь "Luke Small" > написал: > > > > I want to be able

Re: "# systrace -c1000:1000 kate" for privilege escalated editing?

2015-12-02 Thread Vadim Zhukov
03 дек. 2015 г. 4:27 пользователь "Luke Small" написал: > > I want to be able to use systrace for privilege escalation for kompare for > sysmerge diffs and kate. Why isn't systrace able to do this? Because noone wrote a systrace policy for Ka

"# systrace -c1000:1000 kate" for privilege escalated editing?

2015-12-02 Thread Luke Small
I want to be able to use systrace for privilege escalation for kompare for sysmerge diffs and kate. Why isn't systrace able to do this? -Luke

Re: tame(2) will by pass systrace rules

2015-09-20 Thread Sebastien Marie
On Sun, Sep 20, 2015 at 03:28:41PM +0800, johnw wrote: > Hi all, > > I run my program will systrace, I noticed the program can by pass systrace, > If I add the tame(2) call to my program. > Hi John, Yes, it is the expected behaviour than when a program call tame(2), systrace(4

tame(2) will by pass systrace rules

2015-09-20 Thread johnw
Hi all, I run my program will systrace, I noticed the program can by pass systrace, If I add the tame(2) call to my program. my program will connect to inet, if I run my program will systrace, I need to add systrace rule like this "native-connect: permit", I noticed, if I ad

Re: Don't forget systrace Was: running multiple simultaneous X sessions as different users

2015-03-23 Thread luke350
On 03/22/15 07:44, Kevin Chadwick wrote: Systrace is also an option but the policy writing could be a little work, the regex support is certainly helpful there. systrace -A is very helpful Excellent info; thanks. (This list has the highest signal/noise ratio among tech lists that come to mind

Re: Don't forget systrace Was: running multiple simultaneous X sessions as different users

2015-03-22 Thread Kevin Chadwick
On Sat, 21 Mar 2015 14:14:22 -0700 luke...@onemodel.org wrote: > Thanks to all who've commented: this has been educational & useful. Systrace is also an option but the policy writing could be a little work, the regex support is certainly helpful there. systrace -A is very helpf

Re: systrace

2014-12-24 Thread Ted Unangst
On Wed, Dec 24, 2014 at 09:12, Dan Becker wrote: > asking for a friend > > Is the systrace policy format fully documented anywhere? There's a quick > explanation on systrace(1) but there's no dedicated page for the format The explanation may be quick, but as far as i know it is also complete.

systrace

2014-12-24 Thread Dan Becker
asking for a friend Is the systrace policy format fully documented anywhere? There's a quick explanation on systrace(1) but there's no dedicated page for the format -- --Dan

Re: linux port of systrace

2014-05-16 Thread Илья Аржанников
On May 14, 2014, at 10:49, Philip Guenther wrote: > On Tue, May 13, 2014 at 8:06 AM, Илья Аржанников wrote: > I am trying to use linux port systrace. And I found the problem. When I run under systrace (it does not matter with -A or -a (actually it never came till -a)) som

Re: linux port of systrace

2014-05-13 Thread Philip Guenther
On Tue, May 13, 2014 at 8:06 AM, Илья Аржанников wrote: > I am trying to use linux port systrace. And I found the problem. When I > run under systrace (it does not matter with -A or -a (actually it never > came till -a)) something that use vfork systrace and children

Re: linux port of systrace

2014-05-13 Thread Илья Аржанников
net.ipv6.nf_conntrack_frag6_high_thresh = 262144 net.ipv6.ip6frag_secret_interval = 600 net.ipv6.mld_max_msf = 64 net.nf_conntrack_max = 15692 net.unix.max_dgram_qlen = 10 abi.vsyscall32 = 1 crypto.fips_enabled = 0 On May 13, 2014, at 21:37, Илья Аржанников wrote: > > On May 13, 2014, at 21:13, Vad

Re: linux port of systrace

2014-05-13 Thread Илья Аржанников
On May 13, 2014, at 21:13, Vadim Zhukov wrote: > 2014-05-13 19:06 GMT+04:00 Илья Аржанников : >> Hello. >> >> I am trying to use linux port systrace. And I found the problem. When I run >> under systrace (it does not matter with -A or -a (actually it never came >

Re: linux port of systrace

2014-05-13 Thread Vadim Zhukov
2014-05-13 19:06 GMT+04:00 Илья Аржанников : > Hello. > > I am trying to use linux port systrace. And I found the problem. When I run > under systrace (it does not matter with -A or -a (actually it never came till > -a)) something that use vfork systrace and children processe

linux port of systrace

2014-05-13 Thread Илья Аржанников
Hello. I am trying to use linux port systrace. And I found the problem. When I run under systrace (it does not matter with -A or -a (actually it never came till -a)) something that use vfork systrace and children processes hangup. I saw in sources that linux port uses ptrace as backend because

Re: how to use the new rc.d system to start the daemon with systrace?

2011-10-23 Thread Ingo Schwarze
Stuart Henderson wrote on Fri, Oct 21, 2011 at 10:17:11AM +: > On 2011-10-21, johnw wrote: >> after upgrade to current, now /etc/rc use the new rc.d system. >> my question is how to start the daemon(ntpd, named etc ..) with systrace? >> before upgrade to new rc.d syste

Re: how to use the new rc.d system to start the daemon with systrace?

2011-10-21 Thread Stuart Henderson
On 2011-10-21, johnw wrote: > after upgrade to current, now /etc/rc use the new rc.d system. > my question is how to start the daemon(ntpd, named etc ..) with systrace? > before upgrade to new rc.d system, i can edit /etc/rc like this > > echo 'starting named'; named

how to use the new rc.d system to start the daemon with systrace?

2011-10-20 Thread johnw
after upgrade to current, now /etc/rc use the new rc.d system. my question is how to start the daemon(ntpd, named etc ..) with systrace? before upgrade to new rc.d system, i can edit /etc/rc like this echo 'starting named'; named $named_flags to echo 'starting named'

systrace(4) and openssh

2011-08-21 Thread Peter J. Philipp
The new systrace in openssh is great. Good work djm! How would someone go about putting that into inetd? Since inetd is only 1 root process you can't attach a child to it. Can you just make a policy without attaching a child process? -peter

Re: systrace

2009-07-23 Thread Duncan Patton a Campbell
On Wed, 15 Jul 2009 09:57:33 -0600 Bob Beck wrote: > Now it's not to say that *theoretically* systrace can't be a help. > I'm certain it could if you knew 100% what you were doing and knew the > inside and outs of the code. but really that's a job for the &

Re: systrace

2009-07-15 Thread Bob Beck
* Ross Cameron [2009-07-15 03:19]: > On Wed, Jul 15, 2009 at 9:21 AM, Anton Karpov wrote: > > According to Provos's blog, > > > http://www.provos.org/index.php?/archives/34-Evading-System-Sandbox-Containme > nt.html > > > > "The initial prototype of Syst

Re: systrace

2009-07-15 Thread Ted Unangst
On Wed, Jul 15, 2009 at 3:21 AM, Anton Karpov wrote: > But we have no idea about was this solution included into OpenBSD sources > tree or not... > 2009/7/14 Theo de Raadt >> >> No, it isn't fixed.

Re: systrace

2009-07-15 Thread Ross Cameron
On Wed, Jul 15, 2009 at 9:21 AM, Anton Karpov wrote: > According to Provos's blog, > http://www.provos.org/index.php?/archives/34-Evading-System-Sandbox-Containme nt.html > > "The initial prototype of Systrace as described in the paper avoided this > problem by using a

Re: systrace

2009-07-15 Thread Anton Karpov
According to Provos's blog, http://www.provos.org/index.php?/archives/34-Evading-System-Sandbox-Containment.html "The initial prototype of Systrace as described in the paper<http://www.citi.umich.edu/u/provos/papers/systrace.pdf>avoided this problem by using a look-aside buff

Re: systrace

2009-07-14 Thread Theo de Raadt
> I've just been pondering,... were the systrace issues identified with in: > http://it.slashdot.org/it/07/08/09/138224.shtml > ever delt with and corrected? They were not identified there. They were documented in the manual page right from the start. > If so where can

Re: systrace

2009-07-14 Thread Ross Cameron
I've just been pondering,... were the systrace issues identified with in: http://it.slashdot.org/it/07/08/09/138224.shtml ever delt with and corrected? If so where can I find some more info on the fixes made? Many thanks...

Re: systrace insecure [was: Re: chroot browser]

2009-04-04 Thread Edd Barrett
Howdy, On Thu, Mar 26, 2009 at 09:12:42AM -0600, Theo de Raadt wrote: > That said, this is not enough reason to entirely delete the code. It > still has uses. It's useful for checking ports are not dumping junk all over the file-system. Please keep it. Best Regards Edd Barrett (Freelance softw

Re: systrace insecure [was: Re: chroot browser]

2009-04-03 Thread Niels Provos
On Thu, Mar 26, 2009 at 8:23 AM, Jonathan Schleifer wrote: > It was removed when I reported a bug in NETBSD-5-0 that would crash > the Kernel when you tried to use systrace. Instead of fixing that, > they removed it. Looks like you will have to run OpenBSD then. For my personal us

Re: systrace insecure [was: Re: chroot browser]

2009-03-26 Thread Theo de Raadt
> On Thu, Mar 26, 2009 at 10:12 AM, Theo de Raadt > wrote: > > > real; systrace does have the ability to "grant root" unless you build > > Should that read "does not"? > > > the policy specifically to do such a stupid thing (actually, I am no

Re: systrace insecure [was: Re: chroot browser]

2009-03-26 Thread Gregg Reynolds
On Thu, Mar 26, 2009 at 10:12 AM, Theo de Raadt wrote: > real; systrace does have the ability to "grant root" unless you build Should that read "does not"? > the policy specifically to do such a stupid thing (actually, I am not -g

Re: systrace insecure [was: Re: chroot browser]

2009-03-26 Thread Jonathan Schleifer
Am 26.03.2009 um 16:12 schrieb Theo de Raadt: > They freaked out and did the wrong thing. It was removed when I reported a bug in NETBSD-5-0 that would crash the Kernel when you tried to use systrace. Instead of fixing that, they removed it. > systrace has a small problem. It is

Re: systrace insecure [was: Re: chroot browser]

2009-03-26 Thread Theo de Raadt
> > I guess you should take a look at Systrace: > > http://en.wikipedia.org/wiki/Systrace > > > This was removed from NetBSD some time ago because it is vulnerable. > They said it's not only possible to circumvent it, but also gain root > using it. Is this

systrace insecure [was: Re: chroot browser]

2009-03-26 Thread Jonathan Schleifer
Am 26.03.2009 um 07:17 schrieb Tobias Weisserth: > I guess you should take a look at Systrace: > http://en.wikipedia.org/wiki/Systrace This was removed from NetBSD some time ago because it is vulnerable. They said it's not only possible to circumvent it, but also gain root using

Re: Replacement functionality if systrace is to be removed.

2007-12-04 Thread Antoine Jacoutot
On Tue, 4 Dec 2007, Edd Barrett wrote: On 04/12/2007, Antoine Jacoutot <[EMAIL PROTECTED]> wrote: Better fix the port then. I think you misunderstood. The port is fixed, but only because systrace allowed me to cut the build short when the build offended. Ah ok yes, I did misunderstand

Re: Replacement functionality if systrace is to be removed.

2007-12-04 Thread Edd Barrett
Hi, On 04/12/2007, Antoine Jacoutot <[EMAIL PROTECTED]> wrote: > Better fix the port then. I think you misunderstood. The port is fixed, but only because systrace allowed me to cut the build short when the build offended. -- Best Reg

Re: Replacement functionality if systrace is to be removed.

2007-12-04 Thread Antoine Jacoutot
On Tue, 4 Dec 2007, Edd Barrett wrote: I ask because I find USE_SYSTRACE (/etc/mk.conf) essential for the TeXLive port. It writes all over the place during the build. Better fix the port then. -- Antoine

Replacement functionality if systrace is to be removed.

2007-12-04 Thread Edd Barrett
Hi there, I was speaking to someone at OpenCON about the fundamental systrace flaw regarding processes forking in order to bypass the checks. The general impression I was given was that systrace is to be removed at some point. If this is the case, will there be a similar tool available? I ask

Re: hardening BSD (was systrace/stsh policies)

2007-10-17 Thread Theo de Raadt
> Unless I am sorely mistaken, systrace can be broken by any user with > enough priviliges to run two processes. Well, then you are sorely mistaken. One of your processes can break the other one. What's the big deal. Where's the priviledge escalation? There is none. Y

Re: hardening BSD (was systrace/stsh policies)

2007-10-17 Thread Joachim Schipper
greatest versions of software, due to > simplicity/security's sake. Sounds pretty good. > (...) [I] _know_ I would > had a fit trying to get systrace policies set up, if not worse thinking i > had them set up right and figuring out later they weren't and i had in fact >

Re: hardening BSD (was systrace/stsh policies)

2007-10-15 Thread Aaron
Aaron wrote: Joachim Schipper wrote: On Thu, Oct 11, 2007 at 08:54:42PM +0200, Xavier Mertens wrote: Hi *, I'm busy with a systrace/stsh implementation but there is a lack of standard policies (IMHO). Any idea where I can find some ready-to-use policies? I must be missing some impo

Re: hardening BSD (was systrace/stsh policies)

2007-10-15 Thread Joachim Schipper
. >I'm fairly new to OpenBSD and have set up a few machines, nothing > production (...). One thing I did read up on (...) was hardening > beyond the default install. Two of the tools that most of the > hardening articles i found, Securelevels and systrace, (the third one >

Re: hardening BSD (was systrace/stsh policies)

2007-10-15 Thread Janne Johansson
I actually dont think it is all worthless. Imagine a machine running a server daemon. If you systrace that particurlar daemon to not be able to fork()/exec*() or system(), you could be quite sure it wont start random apps on your machine in case someone manages to trick it somehow. Now, if the att

Re: hardening BSD (was systrace/stsh policies)

2007-10-15 Thread Ted Unangst
On 10/14/07, Steve Shockley <[EMAIL PROTECTED]> wrote: > The white paper for the systrace vulnerability was a little bit beyond > me; what's the impact of the issue? Is a system running systrace *more* > vulnerable than a normal system, or is the problem just that a &

Re: hardening BSD (was systrace/stsh policies)

2007-10-15 Thread Nick Guenther
on and audit bypass." (Paper at <http://www.usenix.org/events/woot07/tech/full_papers/watson/watson.pdf>) and Neils Provos says <http://www.systrace.org/index.php?/archives/14-Evading-System-Sandbox-Containment.html> "The initial prototype of Systrace as described in the paper avo

Re: hardening BSD (was systrace/stsh policies)

2007-10-14 Thread Eduardo Tongson
t;[EMAIL PROTECTED]> wrote: > Joachim Schipper wrote: > > You should probably do a Google search on systrace before continuing > > further down this road. In particular, I believe the issue highlighted > > by Robert Watson has not been fixed yet (although I could be wrong, an

Re: hardening BSD (was systrace/stsh policies)

2007-10-14 Thread Francesco Toscan
2007/10/14, Aaron <[EMAIL PROTECTED]>: > I guess with all the hoopla about 'hardening'/trusted this and > that/fuzzy knobs(i.e. SE Linux) i got a little overzealous looking for As others have already pointed out these knobs might not be useful to your setup and your needs. Think also that more

Re: hardening BSD (was systrace/stsh policies)

2007-10-14 Thread Steve Shockley
Joachim Schipper wrote: You should probably do a Google search on systrace before continuing further down this road. In particular, I believe the issue highlighted by Robert Watson has not been fixed yet (although I could be wrong, and would be happy to be wrong in this case). The white paper

Re: hardening BSD (was systrace/stsh policies)

2007-10-14 Thread Darren Spruell
On 10/14/07, Aaron <[EMAIL PROTECTED]> wrote: [snip] > I guess with all the hoopla about 'hardening'/trusted this and > that/fuzzy knobs(i.e. SE Linux) i got a little overzealous looking for > ways to tweak things (which i know can end up either making things less > secure (especially with fa

hardening BSD (was systrace/stsh policies)

2007-10-14 Thread Aaron
Joachim Schipper wrote: On Thu, Oct 11, 2007 at 08:54:42PM +0200, Xavier Mertens wrote: Hi *, I'm busy with a systrace/stsh implementation but there is a lack of standard policies (IMHO). Any idea where I can find some ready-to-use policies? I must be missing some important ones, whe

Re: systrace/stsh policies

2007-10-11 Thread Joachim Schipper
On Thu, Oct 11, 2007 at 08:54:42PM +0200, Xavier Mertens wrote: > Hi *, > > I'm busy with a systrace/stsh implementation but there is a lack of standard > policies (IMHO). Any idea where I can find some ready-to-use policies? > > I must be missing some important ones, wh

systrace/stsh policies

2007-10-11 Thread Xavier Mertens
Hi *, I'm busy with a systrace/stsh implementation but there is a lack of standard policies (IMHO). Any idea where I can find some ready-to-use policies? I must be missing some important ones, when the user logs in, he got immediately the following error: systrace: getcwd: Permission d

Re: systrace/sysjail wrappers security

2007-08-12 Thread Artur Grabowski
Pawel Jakub Dawidek <[EMAIL PROTECTED]> writes: > In my opinion there are just too many potential problems with syscall > wrappers that I fully agree with Robert - they should not be used. I must fully agree here. I never liked systrace and bashed sysjail really hard because the so

Re: systrace/sysjail wrappers security

2007-08-11 Thread Pawel Jakub Dawidek
On Thu, Aug 09, 2007 at 11:30:47AM -0400, Niels Provos wrote: > There is a straight forward solution for this problem. The initial > prototype of Systrace had a look-aside buffer in the kernel for > copyin. I told Robert about this, not sure if he mentioned that in > his paper or

Re: systrace/sysjail wrappers security

2007-08-09 Thread Niels Provos
There is a straight forward solution for this problem. The initial prototype of Systrace had a look-aside buffer in the kernel for copyin. I told Robert about this, not sure if he mentioned that in his paper or not. There obviously would be some associated performance impacts. Niels. On 8/7

Re: systrace/sysjail wrappers security

2007-08-07 Thread Kristaps Dzonsons
> I am using sysjail, so I am very interested how to mitigate attacks or > is there anything OpenBSD could change to mitigate these issues? Until the kernel wrapper issues have been addressed, the sysjail page has been updated to indicate that it SHOULD NOT be used (nor should any syst

systrace/sysjail wrappers security

2007-08-07 Thread Richard Storm
In the First USENIX Workshop on Offensive Technologies (WOOT07) there was presentation by Robert N. M. Watson: "Exploiting Concurrency Vulnerabilities in System Call Wrappers" with exploit code included how to bypass restrictions: http://www.watson.org/~robert/2007woot/2007usenixwoot-exploit

sftp systrace policy.

2006-12-20 Thread RV Tec
Hi, I'm looking for a systrace policy that ensures that a user logged in sftp isn't able to change directories. I've tired dugsong's sshd policy, but that is outdated and would require a systrace master to update it. Also, I've tried to get the one[1] that appea

Re: systrace: vi policy

2006-11-12 Thread Ben Calvert
On Sun, 12 Nov 2006 12:15:39 -0600 (CST) Jacob Yocom-Piatt <[EMAIL PROTECTED]> wrote: > Original message > >Date: Sun, 12 Nov 2006 10:26:10 -0500 > >From: Okan Demirmen <[EMAIL PROTECTED]> > >Subject: Re: systrace: vi policy > >To: misc@openbs

Re: systrace: vi policy

2006-11-12 Thread Okan Demirmen
On Sun 2006.11.12 at 12:15 -0600, Jacob Yocom-Piatt wrote: > Original message > >Date: Sun, 12 Nov 2006 10:26:10 -0500 > >From: Okan Demirmen <[EMAIL PROTECTED]> > >Subject: Re: systrace: vi policy > >To: misc@openbsd.org > > > >On Sun

Re: systrace: vi policy

2006-11-12 Thread Jacob Yocom-Piatt
Original message >Date: Sun, 12 Nov 2006 10:26:10 -0500 >From: Okan Demirmen <[EMAIL PROTECTED]> >Subject: Re: systrace: vi policy >To: misc@openbsd.org > >On Sun 2006.11.12 at 08:55 -0600, Jacob Yocom-Piatt wrote: > >consider sorting your policies...a

Re: systrace: vi policy

2006-11-12 Thread Okan Demirmen
On Sun 2006.11.12 at 08:55 -0600, Jacob Yocom-Piatt wrote: consider sorting your policies...also, try to be more generic in other places, for example, match "/usr/lib/libc.so.*" > Policy: /usr/bin/vi, Emulation: native > native-issetugid: permit > native-mprotect: permit >

systrace: vi policy

2006-11-12 Thread Jacob Yocom-Piatt
i've read through all the docs that i can find on systrace policy generation and enforcement and have hit a snag when trying to generate a working policy for vi that restricts the files that can be read and written by a user. the policy is generated by running "systrace -A vi test.t

systrace / stsh: logging, etc.

2006-11-04 Thread Jacob Yocom-Piatt
shell" error. does anyone have a strong suggestion as to which stsh source to use? when a syscall is denied, i get a lot of repeated messages in /var/log/messages (haven't changed where systrace logs to yet) like so Nov 4 19:21:00 rp systrace: deny user: stest, prog: /usr/bin/vi, pid: 1

Re: OpenBSD / NetBSD systrace kernel integer overflow

2006-10-24 Thread ropers
On 24/10/06, Nicolas Martzel <[EMAIL PROTECTED]> wrote: I thank you all, but M ropers whom the reaction is displaced. :D Thank you. :-) That's almost the only time I've laughed today. (Hey, no hard feelings, right?) --ropers

Re: OpenBSD / NetBSD systrace kernel integer overflow

2006-10-24 Thread Nicolas Martzel
, and now tells me "Wow they are quicker than apple". Lol. Again thanks, bye. > Message du 24/10/06 15:25 > De : "Matthias Kilian" <[EMAIL PROTECTED]> > A : "Nicolas Martzel" <[EMAIL PROTECTED]> > Copie C : misc@openbsd.org > Objet : Re:

Re: OpenBSD / NetBSD systrace kernel integer overflow

2006-10-24 Thread Matthias Kilian
On Tue, Oct 24, 2006 at 03:09:12PM +0200, Nicolas Martzel wrote: > http://scary.beasts.org/security/CESA-2006-003.html http://www.openbsd.org/errata.html#systrace

Re: OpenBSD / NetBSD systrace kernel integer overflow

2006-10-24 Thread ropers
On 24/10/06, Nicolas Martzel <[EMAIL PROTECTED]> wrote: http://scary.beasts.org/security/CESA-2006-003.html Feedback about that ? Corrected or always active ? Thanks, and hope that could help. Ask question? Complete sentence? You talking to me? Thanks, and hope that could help.

Re: OpenBSD / NetBSD systrace kernel integer overflow

2006-10-24 Thread Otto Moerbeek
On Tue, 24 Oct 2006, Nicolas Martzel wrote: > http://scary.beasts.org/security/CESA-2006-003.html > > Feedback about that ? > Corrected or always active ? > > Thanks, and hope that could help. Eh, why don't you look at http://www.openbsd.org/errata.html first? It's already fixed for more than t

Re: OpenBSD / NetBSD systrace kernel integer overflow

2006-10-24 Thread Dries Schellekens
Nicolas Martzel wrote: http://scary.beasts.org/security/CESA-2006-003.html Feedback about that ? Corrected or always active ? http://www.openbsd.org/errata.html#systrace

OpenBSD / NetBSD systrace kernel integer overflow

2006-10-24 Thread Nicolas Martzel
http://scary.beasts.org/security/CESA-2006-003.html Feedback about that ? Corrected or always active ? Thanks, and hope that could help.

Re: fping & systrace

2006-09-03 Thread Julien TOUCHE
Steffen Schuetz wrote on 02/09/2006 22:47: >> "native-getuid: permit as root" doesn't work in a systrace policy > > You should try "true then permit as root" yes, that's it. have forgotten the true :) thanks Regards Julien

Re: fping & systrace

2006-09-02 Thread Steffen Schuetz
On Saturday 02 September 2006 12:14, Julien TOUCHE wrote: [cut] > > i don't get it ??? > > "native-getuid: permit as root" doesn't work in a systrace policy You should try "true then permit as root" > $ sudo /bin/systrace -a -c 556:556 /usr/loc

Re: fping & systrace

2006-09-02 Thread Julien TOUCHE
you want "as root", but for geteuid or whatever > the right syscall is. > i don't get it ??? "native-getuid: permit as root" doesn't work in a systrace policy $ sudo /bin/systrace -a -c 556:556 /usr/local/sbin/fping localhost syntax error /etc/systrace/usr_lo

Re: fping & systrace

2006-09-01 Thread Ted Unangst
On 9/1/06, Julien TOUCHE <[EMAIL PROTECTED]> wrote: > tried setting the policy to have getuid return an error of 0? > > isn't it limited to a deny (returning an errorcode) ? so how ? native-getuid: permit native-getuid: permit[0] => error native-getuid: permit as root => error yeah, actually

Re: fping & systrace

2006-09-01 Thread Julien TOUCHE
Ted Unangst wrote on 01/09/2006 21:21: >> seems fping runs a root check which cannot be overcome by a switch (at >> least in man) >> even if the policy of fping is with "as root" for everything it can't >> run ... >> anything beyond editing the code ? > > tried setting the policy to have getuid re

Re: fping & systrace

2006-09-01 Thread Ted Unangst
On 9/1/06, Julien TOUCHE <[EMAIL PROTECTED]> wrote: i want to use fping with with nrpe/nagios. as security doc of OpenBSD state, i want to use systrace privilege elevation but ... $ sudo /bin/systrace -a -c 556:556 /usr/local/sbin/fping localhost This program can only be run by root, or i

fping & systrace

2006-09-01 Thread Julien TOUCHE
i want to use fping with with nrpe/nagios. as security doc of OpenBSD state, i want to use systrace privilege elevation but ... $ sudo /bin/systrace -a -c 556:556 /usr/local/sbin/fping localhost This program can only be run by root, or it must be setuid root. $ sudo /bin/systrace -a /usr/local

  1   2   >