svn commit: r42179 - head/en_US.ISO8859-1/htdocs/news/status

Gabor Pali pgj at FreeBSD.org
Sat Jul 6 21:29:51 UTC 2013


Author: pgj
Date: Sat Jul  6 21:29:50 2013
New Revision: 42179
URL: http://svnweb.freebsd.org/changeset/doc/42179

Log:
  - Add Q2 report on Capsicum-based sandboxing in base
  
  Submitted by:	pjd

Modified:
  head/en_US.ISO8859-1/htdocs/news/status/report-2013-04-2013-06.xml

Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2013-04-2013-06.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/news/status/report-2013-04-2013-06.xml	Sat Jul  6 19:41:49 2013	(r42178)
+++ head/en_US.ISO8859-1/htdocs/news/status/report-2013-04-2013-06.xml	Sat Jul  6 21:29:50 2013	(r42179)
@@ -18,7 +18,7 @@
 
     <!-- XXX: keep updating the number of entries -->
     <p>Thanks to all the reporters for the excellent work!  This report
-      contains 16 entries and we hope you enjoy reading it.</p>
+      contains 17 entries and we hope you enjoy reading it.</p>
 
     <!-- XXX: set date for the next set of submissions -->
     <p>The deadline for submissions covering between July and September 2013
@@ -858,4 +858,102 @@
       </ul>
     </body>
   </project>
+
+  <project cat='bin'>
+    <title>Capsicum</title>
+
+    <contact>
+      <person>
+	<name>
+	  <given>Pawel Jakub</given>
+	  <common>Dawidek</common>
+	</name>
+	<email>pjd at FreeBSD.org</email>
+      </person>
+
+      <person>
+	<name>
+	  <given>Capsicum</given>
+	  <common>Mailing List</common>
+	</name>
+	<email>cl-capsicum-discuss at lists.cam.ac.uk</email>
+      </person>
+    </contact>
+
+    <links>
+      <url href="http://www.cl.cam.ac.uk/research/security/capsicum/"/>
+      <url href="https://lists.cam.ac.uk/mailman/listinfo/cl-capsicum-discuss"/>
+    </links>
+
+    <body>
+      <p>Capsicum (lightweight OS capability and sandbox framework) is
+	being actively worked on.  In the last few months the following
+	tasks have been completed:</p>
+
+      <ul>
+	<li>Committed Capsicum overhaul to &os; <tt>head</tt> (r247602).
+	  This allows to use capability rights in more places, simplifies
+	  kernel code and implements ability to limit <tt>ioctl(2)</tt>
+	  and <tt>fcntl(2)</tt> system calls.</li>
+
+	<li><tt>hastd(8)</tt> is now using Capsicum for sandboxing, as
+	  whitelisting ioctls is possible (r248297).</li>
+
+	<li><tt>auditdistd(8)</tt> is now using Capsicum for sandboxing,
+	  as it is now possible to setup append-only restriction on file
+	  descriptor (available in Perforce).</li>
+
+	<li>Implemented <tt>connectat(2)</tt> and <tt>bindat(2)</tt>
+	  system calls for UNIX domain sockets that are allowed in
+	  capability mode (r247667).</li>
+
+	<li>Implemented <tt>chflagsat(2)</tt> system call
+	  (r248599).</li>
+
+	<li>Revised the Casper daemon for application capabilities.</li>
+
+	<li>Implemented <tt>libcapsicum</tt> for application
+	  capabilities.</li>
+
+	<li>Implemented various Casper services to be able to use more
+	  functionality within a sandbox: <tt>system.dns</tt>,
+	  <tt>system.pwd</tt>, <tt>system.grp</tt>,
+	  <tt>system.random</tt>, <tt>system.filesystem</tt>,
+	  <tt>system.socket</tt>, <tt>system.sysctl</tt>.</li>
+
+	<li>Implemented Capsicum sandboxing for <tt>kdump(1)</tt> (from
+	  r251073 to r251167).  The version in Perforce also supports
+	  sandboxing for the <tt>-r</tt> flag, using Casper
+	  services.</li>
+
+	<li>Implemented Capsicum sandboxing for <tt>dhclient(8)</tt>
+	  (from r252612 to r252697).</li>
+
+	<li>Implemented Capsicum sandboxing for <tt>tcpdump(8)</tt>
+	  (available in Perforce).</li>
+
+	<li>Implemented Capsicum sandboxing for <tt>libmagic(3)</tt>
+	  (available in Perforce).</li>
+
+	<li>Implemented the <tt>libnv</tt> library for name/value pairs
+	  handling in the hope of wider adaptation across &os;.</li>
+      </ul>
+
+      <p>For Capsicum-based sandboxing in the &os; base system, the
+	commits referenced above and the provided code aim to serve as
+	examples.  We would like to see more &os; tools to be sandboxed
+	— every tool that can parse data from untrusted sources,
+	for example.</p>
+
+      <p>This work is being sponsored by the &os; Foundation and
+	Google.</p>
+    </body>
+
+    <help>
+      <task>Get involved, make the Internet finally(!) a secure place.
+	Contact us at the <tt>cl-capsicum-discuss</tt> mailing list,
+	where we can provide guidelines on how to do sandboxing
+	properly.  The fame is there, waiting.</task>
+    </help>
+  </project>
 </report>


More information about the svn-doc-all mailing list