From owner-freebsd-security@FreeBSD.ORG Wed Nov 8 12:39:45 2006 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 2D3A616A403 for ; Wed, 8 Nov 2006 12:39:45 +0000 (UTC) (envelope-from artifact.one@googlemail.com) Received: from nz-out-0102.google.com (nz-out-0102.google.com [64.233.162.205]) by mx1.FreeBSD.org (Postfix) with ESMTP id 3686643D5A for ; Wed, 8 Nov 2006 12:39:44 +0000 (GMT) (envelope-from artifact.one@googlemail.com) Received: by nz-out-0102.google.com with SMTP id o37so1288746nzf for ; Wed, 08 Nov 2006 04:39:43 -0800 (PST) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=googlemail.com; h=received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=qp1rWNoohsWcHAdYk8LEWAlAuOimwI3ReYBmI+Q5jNNRD01YFg9T3r55tiVWiTmnErb/tzT9x5lnwVWXGhH4OZsQ+p0AQ1WQG58DQG4uIGVm64ymOdCIrC25FNKqaYm8QpAY89Sr9TKOu4lrwtKHKaDMY2Am+bwwrAR/OvlJItU= Received: by 10.64.253.12 with SMTP id a12mr9762230qbi.1162989583005; Wed, 08 Nov 2006 04:39:43 -0800 (PST) Received: by 10.65.237.20 with HTTP; Wed, 8 Nov 2006 04:39:42 -0800 (PST) Message-ID: <8e96a0b90611080439n558022edj79febf458494ef6e@mail.gmail.com> Date: Wed, 8 Nov 2006 12:39:42 +0000 From: "mal content" To: freebsd-security@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline Subject: Sandboxing X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Nov 2006 12:39:45 -0000 Hi. This is mostly hypothetical, just because I want to see how knowledgeable people would go about achieving it: I want to sandbox Mozilla Firefox. For the sake of example, I'm running it under my own user account. The idea is that it should be allowed to connect to the X server, it should be allowed to write to ~/.mozilla and /tmp. I expect some configurations would want access to audio devices in /dev, but for simplicity, that's ignored here. All other filesystem access is denied. Ready... Go! MC