On Thursday 03 March 2005 02:17, nils toedtmann wrote:
> On Wed, Mar 02, 2005 at 12:35:23PM -0800, Jim Carter wrote:
> > On Wed, 2 Mar 2005, Maarten wrote:
> > > Out of curiosity, is a 'default' SKAS-enabled guest (and without the
> > > host-fs kernel option) safe enough as a sandbox to let untrusted users
> > > in, or are additional measures in order to really secure it (or more
> > > paranoia ;-) ? Ie. how difficult is it to gain access to the host OS
> > > from the UML guest?

> But even if the attacker succeeds in running a kernel exploit
> against the host kernel: Most kernel exploits i have seen result
> in id=0, but still inside a chroot. So he still has to escape it,
> which is not so easy if you cannot create devices.
Sorry, a chroot is nothing when you have 0 uid.

See man 2 chroot. This strangeness in chroot() can be fixed with GrSecurity, 
but I've heard it creates problem with Qmail.

> Another problem are dos attacks mounted from a rooted uml. Mr.
> evil could try to consume as much resources as possible to slow
> down the host.

> For example, flooding /dev/net/tun would probably 
> decelerate networking for all other umls.
Interesting, though this concept is a bit 
> Renicing may prevent 
> consuming too much cpu-time. Are there any QoS capabilities on
> the uml roadmap?
Uml is a normal userspace process, so nothing new here. Especially, have you 
investigated normal limits?

With /etc/limits.conf you can ulimit the max CPU time; I guess there's a way 
to limit the traffic out of an interface (I've read some articles on that). 
And there are limits on the number of open files a process can have.

If you want that UML bundles in itself some of this trick, that could be done. 
Really it would be a task for setup utilities to create a proper chroot.
-- 
Paolo Giarrusso, aka Blaisorblade
Linux registered user n. 292729
http://www.user-mode-linux.org/~blaisorblade





-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click
_______________________________________________
User-mode-linux-user mailing list
User-mode-linux-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-user

Reply via email to