[Ur] Seccomp for Ur/Web-generated binaries
    Adam Chlipala 
    adamc at csail.mit.edu
       
    Wed Mar 18 10:57:56 EDT 2015
    
    
  
On 03/17/2015 05:37 PM, Benjamin Barenblat wrote:
> Should we be thinking about seccomp for the binaries 'urweb' makes?
>
> Seccomp is a Linux capabilities system that lets an application define
> and institute a policy for allowed system calls.  This is normally used
> to allow applications to JIT and execute untrusted code (most notably in
> Google Chrome), but it could also be a powerful tool to help mitigate
> exploits against Ur/Web CGI and FastCGI binaries.
It could be worth adding, as either an opt-in feature or one that turns 
on by default when the build process sees Linux.
Most real Ur/Web deployments so far use the C FFI to make system calls 
that "pure" Ur/Web apps never could, so it would be important to make 
the policy configurable, which probably requires some extensions to, 
e.g., the .urp project-file format.  It could be worth doing, but it's 
not obvious that it's worth the effort.
How would you see the Ur/Web programmer experience changing to 
facilitate Seccomp usage?
    
    
More information about the Ur
mailing list