Re: Securing Parrot ASM

2003-02-09 Thread Kv Org
I see two different situations when permissions/capabilities are concerned: the first is when one tries to run untrusted code, modules or parts of code and needs some kind of sanboxing mechanism. Safe has been built with this situation in mind, mostly. The second is when one builds a perl system w

Re: Securing Parrot ASM

2003-01-29 Thread Matthew Byng-Maddick
On Wed, Jan 29, 2003 at 09:20:33AM +, Thomas Whateley wrote: > one more quick question.. would it be possible to play linker games > to redirect syscalls (from compiled c) to wrapper functions that check > permissions? Would that allow us to secure dynamicly linked libs?? When I said "as soo

Re: Securing Parrot ASM

2003-01-29 Thread Thomas Whateley
* Dan Sugalski <[EMAIL PROTECTED]> [030128 19:30]: > Ah, I've been hoping to avoid this for a while for sheer, screaming > lack of tuits, but... Here's the deal for 'safe mode'. (For > background, as everyone in the Unix world seems to be happy > reinventing security wheels, Hey! I wasn't try

Re: Securing Parrot ASM

2003-01-28 Thread Matthew Byng-Maddick
On Tue, Jan 28, 2003 at 02:26:14PM -0500, Dan Sugalski wrote: > *) There'll be a set of 'privileges' of some sort (call 'em > capabilities or whatever) and to do various tasks will require that > you have an appropriate privilege Please don't use "capabilities" for this. The term "capability" is

Re: Securing Parrot ASM

2003-01-28 Thread Dan Sugalski
At 11:41 AM + 1/28/03, Thomas Whateley wrote: Hi, I've been thinking about how to run un-trusted code, without having to audit every line, or use some sort of sandbox, and was wondering if Parrot could provide a Mandator Access Control mechanism (ala SE Linux/Flask). Ah, I've been hoping to

Re: Securing Parrot ASM

2003-01-28 Thread Allen Short
> "Brent" == Brent Dax <[EMAIL PROTECTED]> writes: > I don't see why Parrot couldn't do much of this. It can > certainly audit allocations made through its own > memory-allocation system, and with only a little help from the > system it should be able to audit its processor u

Re: Securing Parrot ASM

2003-01-28 Thread Allen Short
> "Matthew" == Matthew Byng-Maddick <[EMAIL PROTECTED]> writes: >> I guess what I'm saying is, sure, you can't stop a native >> function (which was called from parrot code) from doing >> whatever it wants, but you can still prevent the parrot code >> from using that function in

Re: Securing Parrot ASM

2003-01-28 Thread Fred K Ollinger
> On Tue, Jan 28, 2003 at 10:39:33AM -0600, Joseph Guhlin wrote: > > Pardon my ignorance on the whole issue but I'm just a lurker trying to > > understand enough to help out. =) > > I know security on parrot like this would be difficult, and this thread > > is specifically about securing PASM, but

Re: Securing Parrot ASM

2003-01-28 Thread Christopher Armstrong
On Tue, Jan 28, 2003 at 04:15:41PM +, Matthew Byng-Maddick wrote: > On Tue, Jan 28, 2003 at 11:04:43AM -0500, Christopher Armstrong wrote: > > Hrm, maybe I just don't know what's going on, but I'm not sure why > > this is a problem. Couldn't "call out to native functions" or perhaps > > "call o

Re: Securing Parrot ASM

2003-01-28 Thread Christopher Armstrong
On Tue, Jan 28, 2003 at 09:24:20AM -0800, Brent Dax wrote: > Christopher Armstrong: > # One other thing to think about is resource limits. It'd be nice to not > # require `ulimit' or whatever system-specific resource limitation > # mechanism, but rather rely on the parrot interpreter to > # baby-si

RE: Securing Parrot ASM

2003-01-28 Thread Brent Dax
Matthew Byng-Maddick: # It seems to me that the linking with native code is going to # end up being one that most people switch on, because it will # be necessary and/or useful in getting anything done. Then make sure that "link in native code" isn't a permission--"link in native code library X"

RE: Securing Parrot ASM

2003-01-28 Thread Brent Dax
Christopher Armstrong: # One other thing to think about is resource limits. It'd be nice to not # require `ulimit' or whatever system-specific resource limitation # mechanism, but rather rely on the parrot interpreter to # baby-sit. Also, it'd make catching these resource-limit violations # much mo

Re: Securing Parrot ASM

2003-01-28 Thread Matthew Byng-Maddick
On Tue, Jan 28, 2003 at 10:39:33AM -0600, Joseph Guhlin wrote: > Pardon my ignorance on the whole issue but I'm just a lurker trying to > understand enough to help out. =) > I know security on parrot like this would be difficult, and this thread > is specifically about securing PASM, but what abo

Re: Securing Parrot ASM

2003-01-28 Thread Joseph Guhlin
Pardon my ignorance on the whole issue but I'm just a lurker trying to understand enough to help out. =) I know security on parrot like this would be difficult, and this thread is specifically about securing PASM, but what about something like FreeBSD's 'jail' command built in? That way, even un

Re: Securing Parrot ASM

2003-01-28 Thread Fred K Ollinger
> I've been thinking about how to run un-trusted code, > without having to audit every line, or use some sort of sandbox, > and was wondering if Parrot could provide a Mandator Access > Control mechanism (ala SE Linux/Flask). I think that this is a great idea. > When assembling Parrot, the assemb

Re: Securing Parrot ASM

2003-01-28 Thread Matthew Byng-Maddick
On Tue, Jan 28, 2003 at 11:04:43AM -0500, Christopher Armstrong wrote: > On Tue, Jan 28, 2003 at 02:11:39PM +, Matthew Byng-Maddick wrote: > > What happens when you link in some module that's written natively? > > Basically, my conclusion was that this was, unfortunately, still > Hrm, maybe I j

Re: Securing Parrot ASM

2003-01-28 Thread Christopher Armstrong
On Tue, Jan 28, 2003 at 02:11:39PM +, Matthew Byng-Maddick wrote: > On Tue, Jan 28, 2003 at 11:41:14AM +, Thomas Whateley wrote: > > I've been thinking about how to run un-trusted code, > > without having to audit every line, or use some sort of sandbox, > [snip] > > block to audit and be c

Re: Securing Parrot ASM

2003-01-28 Thread Matthew Byng-Maddick
On Tue, Jan 28, 2003 at 11:41:14AM +, Thomas Whateley wrote: > I've been thinking about how to run un-trusted code, > without having to audit every line, or use some sort of sandbox, [snip] > block to audit and be certain of what a module/program could > do to my system. As author of http://de

Re: Securing Parrot ASM

2003-01-28 Thread Christopher Armstrong
On Tue, Jan 28, 2003 at 11:41:14AM +, Thomas Whateley wrote: > Hi, > > I've been thinking about how to run un-trusted code, > without having to audit every line, or use some sort of sandbox, > and was wondering if Parrot could provide a Mandator Access > Control mechanism (ala SE Linux/Flask)