-
Notifications
You must be signed in to change notification settings - Fork 173
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Q: use a whitelist, and notify when the process tries to use a syscall that is not on the whitelist #420
Comments
Hi @godalming123, As a FYI, we don't provide Zig language bindings so the amount of help we can provide may be limited, but we'll try. Beyond that, I'm not clear what you are asking about in this issue, can you rephrase your question? |
@pcmoore In terms of what I want, I want to create a whitelist syscall filter that a sandboxed program can use, and then when the sandboxed program tries to use a syscall that isn't in the whitelist, trigger a callback so that the main program can ask the user if they want to allow the sandboxed program access to the syscall. Something like:
|
@pcmoore Is this possible, and if so how can it be done? I don't mind if this isn't possible, I just want a response please. |
You have to use ACT_NOTIFY, as you already did in your OP, to get user space callbacks. Also you must make sure that the program can not spoof user input and self-approve those requests. |
Hi @godalming123, are you satisfied with @rusty-snake's answer above? |
@pcmoore rusty-snakes answer helped, but I still can't get it too work, so far I have the following: const std = @import("std");
const c = @cImport({
@cInclude("seccomp.h");
});
pub fn main() !void {
// Initialise libseccomp
const ctx = c.seccomp_init(c.SCMP_ACT_NOTIFY);
if (ctx == null) {
return error.FailedToInitialiseSeccomp;
}
defer c.seccomp_release(ctx);
// Apply seccomp filters
// TODO: add any other filters that are needed
if (c.seccomp_rule_add_exact(ctx, c.SCMP_ACT_ALLOW, c.__NR_read, 0) != 0) {
return error.FailedToAllowReadSyscall;
}
if (c.seccomp_rule_add_exact(ctx, c.SCMP_ACT_ALLOW, c.__NR_write, 0) != 0) {
return error.FailedToAllowWriteSyscall;
}
// Load seccomp filters
if (c.seccomp_load(ctx) < 0) {
return error.FailedToLoadSeccompRules;
}
// Setup listener for a notify event
const fd = c.seccomp_notify_fd(ctx);
if (fd < 0) {
return error.FailedToFindSeccompNotifyFileDiscriptor;
}
std.os.close(fd);
// Fork
const pid = try std.os.fork();
if (pid == 0) { // Child process for running the specified command
return std.os.execvpeZ(std.os.argv[1], @ptrCast(&std.os.argv[1..]), &[_:null]?[*:0]u8{null});
} else { // Parent process for listening if the child process uses a syscall other then `read` or `write`
// Allocate structs for request and response
var req: ?*c.seccomp_notif = null;
var resp: ?*c.seccomp_notif_resp = null;
if (c.seccomp_notify_alloc(&req, &resp) != 0) {
return error.FailedToAllocateNotify;
}
// Loop for listening to notify events
while (true) {
if (c.seccomp_notify_receive(fd, req) != 0) {
return error.FailedToRecieveNotify;
}
std.debug.print("Seccomp process tried to use syscall number: {}.", .{req.?.data.nr});
if (c.seccomp_notify_id_valid(fd, req.?.id) != 0) {
return error.SeccompNotifyIdIsNotValid;
}
if (c.seccomp_notify_respond(fd, null) != 0) {
return error.FailedToRespondToSeccompNotifySyscall;
}
}
}
} If I run the compiled binary like so: |
You create a seccomp filter that only allows |
@rusty-snake thank you for the explanation as to why my code does not work. Do you have a way to implement this functionality that does work? If you move the part of the code that gets the file descriptor before the code that loads the filter, then libseccomp returns a negative file descriptor which (correct me if I'm wrong) signals an error. |
Hi, I was trying to develop a sandbox application where processes start with the bare minimum allowed syscalls to operate (
read
,write
,exit
,sigreturn
) and then when they try to access more system calls, the user is notified and can either allow access or deny access and kill the process.Currently I have the follwoing zig code:
The text was updated successfully, but these errors were encountered: