Re: systrace/sysjail wrappers security

2007-08-12 Thread Artur Grabowski
Pawel Jakub Dawidek <[EMAIL PROTECTED]> writes: > In my opinion there are just too many potential problems with syscall > wrappers that I fully agree with Robert - they should not be used. I must fully agree here. I never liked systrace and bashed sysjail really hard because the solution is at th

Re: systrace/sysjail wrappers security

2007-08-11 Thread Pawel Jakub Dawidek
On Thu, Aug 09, 2007 at 11:30:47AM -0400, Niels Provos wrote: > There is a straight forward solution for this problem. The initial > prototype of Systrace had a look-aside buffer in the kernel for > copyin. I told Robert about this, not sure if he mentioned that in > his paper or not. There obv

Re: systrace/sysjail wrappers security

2007-08-09 Thread Niels Provos
There is a straight forward solution for this problem. The initial prototype of Systrace had a look-aside buffer in the kernel for copyin. I told Robert about this, not sure if he mentioned that in his paper or not. There obviously would be some associated performance impacts. Niels. On 8/7/0

Re: systrace/sysjail wrappers security

2007-08-07 Thread Kristaps Dzonsons
> I am using sysjail, so I am very interested how to mitigate attacks or > is there anything OpenBSD could change to mitigate these issues? Until the kernel wrapper issues have been addressed, the sysjail page has been updated to indicate that it SHOULD NOT be used (nor should any systrace(4) sys

systrace/sysjail wrappers security

2007-08-07 Thread Richard Storm
In the First USENIX Workshop on Offensive Technologies (WOOT07) there was presentation by Robert N. M. Watson: "Exploiting Concurrency Vulnerabilities in System Call Wrappers" with exploit code included how to bypass restrictions: http://www.watson.org/~robert/2007woot/2007usenixwoot-exploit