Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 14 Aug 2010 20:19:48 +0100 (BST)
From:      Robert Watson <robert.watson@cl.cam.ac.uk>
To:        Hugo Silva <hugo@barafranca.com>
Cc:        freebsd-security@FreeBSD.org
Subject:   Re: Capsicum: practical capabilities for UNIX (fwd)
Message-ID:  <alpine.BSF.2.00.1008142017360.17208@fledge.watson.org>
In-Reply-To: <4C650A01.5070002@barafranca.com>
References:  <alpine.BSF.2.00.1008130533540.76639@fledge.watson.org> <4C650A01.5070002@barafranca.com>

next in thread | previous in thread | raw e-mail | index | archive | help


On Fri, 13 Aug 2010, Hugo Silva wrote:

>> For those following security and access control in FreeBSD, this may be of 
>> interest.  We'll have updated patches for Capsicum available for FreeBSD 
>> 8.1 in the next week or so.  Feedback on the approach would be most 
>> welcome!
>
> Very nice. I am looking forward to play with this ;-)

Thanks!

Right now our prototype is against a month or so old 9-CURRENT, with a 
somewhat more recent 8.x snapshot.  Several of us are on travel now but with 
any luck we can do a set of patches against a vanilla 8.1 later in the month. 
The merge plan for 9.x isn't determined yet, we have a number of issues that 
need to be worked through, including a few missing features and more extensive 
test suites.

For those that are interested in lending a hand as early adopters, we have a 
Capsicum mailing list which can be subscribed to via our web page:

   http://www.cl.cam.ac.uk/research/security/capsicum/

This work is increasingly ready to get attention from folks other than us!

Robert

>
>> 
>> ---------- Forwarded message ----------
>> Date: Thu, 12 Aug 2010 03:00:03 -0000
>> From: Light Blue Touchpaper <notify+lbt-admin@cl.cam.ac.uk>
>> Reply-To: cl-security-research@lists.cam.ac.uk
>> To: cl-security-research@lists.cam.ac.uk
>> Subject: Capsicum: practical capabilities for UNIX
>> 
>> URL: 
>> http://www.lightbluetouchpaper.org/2010/08/12/capsicum-practical-capabilities-for-unix/ 
>> by Robert N. M. Watson
>> 
>> Today, Jonathan Anderson, Ben Laurie, Kris Kennaway, and I presented 
>> [Capsicum:
>> practical capabilities for UNIX][1] at the [19th USENIX Security 
>> Symposium][2]
>> in Washington, DC; the [slides][3] can be found on the [Capsicum web 
>> site][4].
>> We argue that capability design principles fill a gap left by discretionary
>> access control (DAC) and mandatory access control (MAC) in operating 
>> systems
>> when supporting security-critical and security-aware applications.
>> 
>> Capsicum responds to the trend of application compartmentalisation 
>> (sometimes
>> called privilege separation) by providing strong and well-defined isolation
>> primitives, and by facilitating rights delegation driven by the application 
>> (and
>> eventually, user). These facilities prove invaluable, not just for 
>> traditional
>> security-critical programs such as tcpdump and OpenSSH, but also complex
>> security-aware applications that map distributed security policies into 
>> local
>> primitives, such as Google's Chromium web browser, which implement the 
>> same-
>> origin policy when sandboxing JavaScript execution.
>> 
>> Capsicum extends POSIX with a new _capability mode_ for processes, and
>> _capability_ file descriptor type, as well as supporting primitives such as
>> _process descriptors_. Capability mode denies access to global operating 
>> system
>> namespaces, such as the file system and IPC namespaces: only delegated 
>> rights
>> (typically via file descriptors or more refined capabilities) are available 
>> to
>> sandboxes. We prototyped Capsicum on FreeBSD 9.x, and have extended a 
>> variety of
>> applications, including Google's Chromium web browser, to use Capsicum for
>> sandboxing. Our paper discusses design trade-offs, both in Capsicum and in
>> applications, as well as a performance analysis. Capsicum is available 
>> under a
>> BSD license.
>> 
>> Capsicum is collaborative research between the University of Cambridge and
>> Google, and has been sponsored by Google, and will be a foundation for 
>> future
>> work on application security, sandboxing, and usability security at 
>> Cambridge
>> and Google. Capsicum has also been backported to FreeBSD 8.x, and Heradon
>> Douglas at Google has an in-progress port to Linux.
>> 
>> We're also pleased to report the Capsicum paper won Best Student Paper 
>> award at
>> the conference!
>>
>>    [1]: 
>> http://www.cl.cam.ac.uk/research/security/capsicum/papers/2010usenix-
>> security-capsicum-website.pdf
>>
>>    [2]: http://www.usenix.org/events/sec10/
>>
>>    [3]: http://www.cl.cam.ac.uk/research/security/capsicum/slides/20100811
>> -usenix-capsicum.pdf
>>
>>    [4]: http://www.cl.cam.ac.uk/research/security/capsicum/
>> 
>> _______________________________________________
>> freebsd-security@freebsd.org mailing list
>> http://lists.freebsd.org/mailman/listinfo/freebsd-security
>> To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.00.1008142017360.17208>