tlsdate icon indicating copy to clipboard operation
tlsdate copied to clipboard

Audit seccomp and add no_new_privs everywhere

Open ioerror opened this issue 11 years ago • 4 comments

We should ensure that tlsdated, tlsdate and tlsdate-helper are all audited properly. Lets confirm their seccomp status, lets ensure that when we drop privs, we can't regain them (even without seccomp filtering) and so on.

ioerror avatar Oct 13 '14 10:10 ioerror

tlsdated seems to do it properly. tlsdate and tlsdate-helper when run independently are not yet hardened.

ioerror avatar Oct 15 '14 20:10 ioerror

This will likely land in 0.0.12 - quick and dirty efforts to sandbox tlsdate and tlsdate-helper resulted in tlsdated ceasing to function properly. As it stands, I want to ensure seccomp is in use with tlsdated by default as it is enabled as a service and running at boot on Debian GNU/Linux. I will probably add a sandboxing function when tlsdated doesn't invoke it. This will take more than a few minutes and so it seems reasonable to wait for this feature.

ioerror avatar Oct 20 '14 17:10 ioerror

@redpig - I'm thinking that I might set a flag for running tlsdate that will ensure that if set by tlsdated, it won't enable the seccomp jail. If it isn't disabled at run time, it will be loaded (say by tlsdate -> tlsdate-helper).

This should allow tlsdate/tlsdate-helper to both use seccomp without requing that a user is running the tlsdated daemon. Does that seem reasonable?

ioerror avatar Oct 22 '14 01:10 ioerror

This feature will go into 0.0.13 and not into 0.0.12.

ioerror avatar Oct 24 '14 18:10 ioerror