Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 29 Mar 2025 19:50:37 +0000
From:      Shawn Webb <shawn.webb@hardenedbsd.org>
To:        Rick Macklem <rick.macklem@gmail.com>
Cc:        Dennis Clarke <dclarke@blastwave.org>, freebsd-current@freebsd.org
Subject:   Re: RFC: Solaris style extended attributes for FreeBSD
Message-ID:  <3dso3cojzxnylcfmpmgwzizp4omzpmnbfgz3zt5pvgeur4wss6@kblfkmtssebw>
In-Reply-To: <CAM5tNy6DTULRg86ainHQYRP0pic60epi4yVDKJ_U3waf3N%2Be2Q@mail.gmail.com>
References:  <CAM5tNy6wkfPRUpkyHB3h6=fhJHf-eFSWWNdeHV5VLA_xG7pGDA@mail.gmail.com> <410014e4-75a6-4923-8f84-3935cab41c31@blastwave.org> <CAM5tNy6UEcoNVTaZxXfje4UY%2BNuBcK-O3fBCNcf%2B-K4rBp7sVw@mail.gmail.com> <sntzdnewyxq2ncoemz5kq7ryirvhv2n2rrxkax265vsbjb2smm@ez7eyxigawpu> <CAM5tNy6DTULRg86ainHQYRP0pic60epi4yVDKJ_U3waf3N%2Be2Q@mail.gmail.com>

index | next in thread | previous in thread | raw e-mail

[-- Attachment #1 --]
On Sat, Mar 29, 2025 at 12:39:02PM -0700, Rick Macklem wrote:
> > I had added filesystem extended attribute support to libarchive, which
> > is what FreeBSD's tar(1) is based off of. I upstreamed that, so that's
> > taken care of. FreeBSD's tar(1) has supported extended attributes
> > since 2020 (see libarchive PR 1409:
> > https://github.com/libarchive/libarchive/pull/1409)
> Ok, thanks for the info. If this stuff goes into FreeBSD, it probably needs
> to be tweaked to use the different syscall API so that it can handle large
> attributes and maybe the attribute's mode. (someday, maybe?)

I believe libarchive has been updated in FreeBSD since October 2020,
so the vendored libarchive in FreeBSD should already support it. But,
yeah, if FreeBSD makes changes to how extended attributes work, I or
someone else would need to update libarchive to account for that.

Since HardenedBSD follows FreeBSD closely (we sync every six hours), I
would probably volunteer to update the libarchive code.

> > Just one data point here: HardenedBSD uses filesystem extended
> > attributes to toggle certain exploit mitigations on a per-application
> > basis. That's why we added support to libarchive: so we can ship
> > certain packages with exploit mitigations pre-toggled.
> Just curious. Does it use "system" or "user" attribute space?

We use the system namespace, though the userland tool (hbsdcontrol)
was recently taught about the user namespace. The kernel side only
supports system namespace. So the user namespace support in
hbsdcontrol is somewhat meaningless. I do plan to eventually get to
the kernel side, but my TODO list continues growing. :-)

Thanks,

-- 
Shawn Webb
Cofounder / Security Engineer
HardenedBSD

Tor-ified Signal: +1 303-901-1600 / shawn_webb_opsec.50
https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
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=taP7
-----END PGP SIGNATURE-----
home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3dso3cojzxnylcfmpmgwzizp4omzpmnbfgz3zt5pvgeur4wss6>