On Tue, Sep 3, 2013 at 6:41 PM, niXman <i.nix...@gmail.com> wrote:
> Thank you for your answers!
>
> It would seem that such technology as SECCOMP is very necessary in the
> kernel but the current implementation does not allow to implement a complete
> filtering / logging / limitation of many system calls ...
>
>> But should not be used as a security measure because it is easy to
>> circumvent
> Yes, exactly for that I wanted to use libseccomp. It is unfortunate that the
> current implementation is so limited: (
> Tell me please, what can you recommend to me?

A good chuck of syscalls can be delegated to a trusted process:

- Capture the syscall using trap.
- Send a message to a trusted process using a socket.
- Get the fd back (or not) in case of an open()
- Emulate the syscall.

------------------------------------------------------------------------------
Learn the latest--Visual Studio 2012, SharePoint 2013, SQL 2012, more!
Discover the easy way to master current and previous Microsoft technologies
and advance your career. Get an incredible 1,500+ hours of step-by-step
tutorial videos with LearnDevNow. Subscribe today and save!
http://pubads.g.doubleclick.net/gampad/clk?id=58040911&iu=/4140/ostg.clktrk
_______________________________________________
libseccomp-discuss mailing list
libseccomp-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/libseccomp-discuss

Reply via email to