-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Capsicum support #59
Comments
Well, nobody will ever use libcasper without using capsicum. There are, however, plenty of use cases for capsicum that don't require libcasper. But shorn of its services, libcasper is pretty small. IMHO it doesn't require a standalone crate. What about adding it to capsicum-rs, but gated by a feature flag? |
Thanks! That makes sense. |
Thanks for the suggestion! I like it and it seems you thought about all the questions I would have. Not a fan of the global variable for the casper connection but if it's between that and breaking the API I prefer not breaking the API. Having it behind an |
Correct. Capsicum is FreeBSD only. There was a Linux port, but I don't think it's complete or currently maintained. |
Status update: I've gotten Casper working on a different real-world project (but not cap_sysctl). But I actually no longer have a personal need for cap_sysctl, so I'm going to deprioritize that part. Currently I'm blocked by a few PRs at https://github.com/Inner-Heaven/libnv-rs/ before we can integrate this into the capsicum-rs crate. |
👍 Thanks for working on this and adding an update |
FreeBSD's Capsicum facility is used to sandbox processes into a capability mode. Unable to access any global namespaces, their ability to harm the overall system is very limited. It's a terrific security feature. But the sysctl(3) functions do access global namespaces. So to use them in capability mode requires a helper: the Casper library. Once a process is in capability mode, it can use the cap_sysctl(3) facility to access sysctls. I originally attempted to implement
cap_sysctl
in a separate crate, but encountered difficulties. Basically, it's just way too complicated. Dealing with sysctls, as you know, requires lots of code to handle all the different data types. So instead of having a separatecap-sysctl-rs
crate, I propose moving that functionality into here. If you agree, this is what I think we should do:libcasper-sys
crate. I'll raise the issue with the libc team and see which they prefer.libcasper
support within the capsicum-rs crate. I've already got a branch for this.SysctlProvider
trait to this crate with three methods:sysctlbyname
,sysctl
, andsysctlnametomib
. Existing functions likeunix::funcs::value_oid
will gain a new argument, a&dyn SysctlProvider
.NativeSysctlProvider
andCasperSysctlProvider
. The former will simply wrap the existingsysctl(3)
functions. The latter will wrapcap_sysctl(3)
, and will also include methods to initialize the casper connection and configure limits.CasperSysctl
struct and implement theSysctl
trait for it. In order to preserve the existing API, the actual casper connection will have to be a global variable.What do you think? cc @dlrobertson .
The text was updated successfully, but these errors were encountered: