I see two different situations when
permissions/capabilities are concerned: the first is
when one tries to run untrusted code, modules or parts
of code and needs some kind of sanboxing mechanism.
Safe has been built with this situation in mind,
mostly.
The second is when one builds a perl system
On Wed, Jan 29, 2003 at 09:20:33AM +, Thomas Whateley wrote:
one more quick question.. would it be possible to play linker games
to redirect syscalls (from compiled c) to wrapper functions that check
permissions? Would that allow us to secure dynamicly linked libs??
When I said as soon
On Tue, Jan 28, 2003 at 11:41:14AM +, Thomas Whateley wrote:
Hi,
I've been thinking about how to run un-trusted code,
without having to audit every line, or use some sort of sandbox,
and was wondering if Parrot could provide a Mandator Access
Control mechanism (ala SE Linux/Flask).
On Tue, Jan 28, 2003 at 11:41:14AM +, Thomas Whateley wrote:
I've been thinking about how to run un-trusted code,
without having to audit every line, or use some sort of sandbox,
[snip]
block to audit and be certain of what a module/program could
do to my system.
As author of
On Tue, Jan 28, 2003 at 02:11:39PM +, Matthew Byng-Maddick wrote:
On Tue, Jan 28, 2003 at 11:41:14AM +, Thomas Whateley wrote:
I've been thinking about how to run un-trusted code,
without having to audit every line, or use some sort of sandbox,
[snip]
block to audit and be certain
On Tue, Jan 28, 2003 at 11:04:43AM -0500, Christopher Armstrong wrote:
On Tue, Jan 28, 2003 at 02:11:39PM +, Matthew Byng-Maddick wrote:
What happens when you link in some module that's written natively?
Basically, my conclusion was that this was, unfortunately, still
Hrm, maybe I just
I've been thinking about how to run un-trusted code,
without having to audit every line, or use some sort of sandbox,
and was wondering if Parrot could provide a Mandator Access
Control mechanism (ala SE Linux/Flask).
I think that this is a great idea.
When assembling Parrot, the assembler
Pardon my ignorance on the whole issue but I'm just a lurker trying to
understand enough to help out. =)
I know security on parrot like this would be difficult, and this thread
is specifically about securing PASM, but what about something like
FreeBSD's 'jail' command built in? That way, even
On Tue, Jan 28, 2003 at 10:39:33AM -0600, Joseph Guhlin wrote:
Pardon my ignorance on the whole issue but I'm just a lurker trying to
understand enough to help out. =)
I know security on parrot like this would be difficult, and this thread
is specifically about securing PASM, but what about
Christopher Armstrong:
# One other thing to think about is resource limits. It'd be nice to not
# require `ulimit' or whatever system-specific resource limitation
# mechanism, but rather rely on the parrot interpreter to
# baby-sit. Also, it'd make catching these resource-limit violations
# much
Matthew Byng-Maddick:
# It seems to me that the linking with native code is going to
# end up being one that most people switch on, because it will
# be necessary and/or useful in getting anything done.
Then make sure that link in native code isn't a permission--link in
native code library X
On Tue, Jan 28, 2003 at 09:24:20AM -0800, Brent Dax wrote:
Christopher Armstrong:
# One other thing to think about is resource limits. It'd be nice to not
# require `ulimit' or whatever system-specific resource limitation
# mechanism, but rather rely on the parrot interpreter to
# baby-sit.
On Tue, Jan 28, 2003 at 04:15:41PM +, Matthew Byng-Maddick wrote:
On Tue, Jan 28, 2003 at 11:04:43AM -0500, Christopher Armstrong wrote:
Hrm, maybe I just don't know what's going on, but I'm not sure why
this is a problem. Couldn't call out to native functions or perhaps
call out to
On Tue, Jan 28, 2003 at 10:39:33AM -0600, Joseph Guhlin wrote:
Pardon my ignorance on the whole issue but I'm just a lurker trying to
understand enough to help out. =)
I know security on parrot like this would be difficult, and this thread
is specifically about securing PASM, but what
Matthew == Matthew Byng-Maddick [EMAIL PROTECTED] writes:
I guess what I'm saying is, sure, you can't stop a native
function (which was called from parrot code) from doing
whatever it wants, but you can still prevent the parrot code
from using that function in the first place
Brent == Brent Dax [EMAIL PROTECTED] writes:
I don't see why Parrot couldn't do much of this. It can
certainly audit allocations made through its own
memory-allocation system, and with only a little help from the
system it should be able to audit its processor usage as well
At 11:41 AM + 1/28/03, Thomas Whateley wrote:
Hi,
I've been thinking about how to run un-trusted code,
without having to audit every line, or use some sort of sandbox,
and was wondering if Parrot could provide a Mandator Access
Control mechanism (ala SE Linux/Flask).
Ah, I've been hoping
17 matches
Mail list logo