OpenBSD Journal

New systrace facility in -current

Contributed by jose on from the new-guy dept.

Recently, a project to enhance the security mechanisms in OpenBSD was imported into -current. The systrace facility is used to enforce system call policies. This allows for sandboxing of applications and users, giving a fine grained amount of control to the administration.

From the CVS changes list:


List:     openbsd-cvs
Subject:  CVS: cvs.openbsd.org: src
From:     Niels Provos

Date:     2002-05-16 16:16:52

CVSROOT:        /cvs
Module name:    src
Changes by:     provos@cvs.openbsd.org  2002/05/16 10:16:52

Modified files:
        sys/kern       : kern_exit.c kern_fork.c 
        sys/conf       : files 
        sys/sys        : conf.h file.h proc.h 
        sys/arch/i386/i386: conf.c trap.c 
Added files:
        sys/dev        : systrace.c systrace.h 

Log message:
systrace facility, used to enforce and generate policies for system calls
okay deraadt@

With these changes, users of -current can extend the security of the system arbitrarily. This seems almost perfect for a multiuser system, or a bastion host.

(Comments are closed)


Comments
  1. By <font color="#336666"><b>Brilliant Idea. Simply Brilliant.<nt>< () on

  2. By dammit jim I'm a doctor () dammitjimimadoctor@yahoo.com on www.dammitjimimadoctor.com

    This is all I get when I try to run it:

    systrace: open: /dev/systrace: No such file or directory
    systrace: fcntl(O_NONBLOCK): Bad file descriptor
    systrace: main:434: intercept failed: Bad file descriptor

    Sure enough: I have no /dev/systrace. How does one come by such a device?

  3. By Hettb () htb@subdimension.com on mailto:htb@subdimension.com

    OpenBSD is my favorite OS, so I am naturally glad that, after so many years, the developrs have decided to incorporate features which have been in the other BSDs' source trees for a long time.

    Personally, I do not need all the latest security mesures and bugfixes, as I use OpenBSD pirmarily as a desktop operating system and for surfing the Web, and therefore it's unlikely I'd have to defend myself against evil system hackers, but seeing that work is actually getting done and that the developers haven't left might give the BSDs' dwindling userbase new hope.

    Another thing I am looking forward to is OpenBSD kernel support for KDE 3.0; I'm sure that, if Theo et al could finally get around to implementing this, OpenBSD would easily surpass Linux in popularity.

    The furutre looks bright for OpenBSD. ^_^

Latest Articles

Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]