Hi,

I've been thinking about how to run un-trusted code,
without having to audit every line, or use some sort of sandbox,
and was wondering if Parrot could provide a Mandator Access 
Control mechanism (ala SE Linux/Flask).

When assembling Parrot, the assembler could either look in a 
file or a perl BEGIN type block containing a list of access 
requests along the lines of:

  syscall time
  read-write directory /tmp
  listen socket 80
  connect socket 25
  read-write file /etc/shadow


These commands should be easy/quick to audit, could be easily
generated by higher level language complier from similar 
directives in whichever language it is compiling, and parrot 
would guarentee that only these system priviledges were 
provided.

As a sysadmin I'd certainly be gratefull to have a small
block to audit and be certain of what a module/program could
do to my system.

If people think something like this would be usefull, I'd be
more than happy to research this further and try to come up
with some code....


Cheers,
Tom

Reply via email to