"It will have full access to all kernel objects in the system including all
user pages, CNodes, and endpoints (it won't actually map user pages except if
a process opens the associated file for read/write I/O as opposed
to mapping the file), and it will control access to all user-visible resources
in the system by managing process file permission lists."

Ok, I still don't have the required skills (know-how of the seL4 inners) to
say if this is the right/secure way to do this job, but just in case it is
(others should put some light on this) as an attacker I would put all my
effort to find vulnerabilities in this piece of code as per your
description it looks to me like a "sexy" entry point to the system.


El sáb., 31 jul. 2021 12:54, Andrew Warkentin <andreww...@gmail.com>
escribió:

> On 7/31/21, Hugo V.C. <skydive...@gmail.com> wrote:
> > "Therefore the process server will be almost as important as the kernel
> > when it comes to security"
> >
> > I'm not developer, so please excuse my ignorance in some topics (like OS
> > dev), but, I've experience in exploiting OS stuff and I always prefer a
> > ring 0 vuln than a ring 3 vuln... If the process server is implemented at
> > user space (ring 3) then I don't get how we can compare security in so
> > different cpu execution modes. Am I missing something?
> >
>
> (sorry, mistakenly sent this privately instead of to the list before)
>
> Even though the process server will run in user mode as far as the
> hardware and microkernel are concerned, functionally it will be akin
> to something above user processes but below the kernel. It will have
> full access to all kernel objects in the system including all user
> pages, CNodes, and endpoints (it won't actually map user pages except
> if a process opens the associated file for read/write I/O as opposed
> to mapping the file), and it will control access to all user-visible
> resources in the system by managing process file permission lists.
> This is very similar in scope to QNX's process server except that it
> won't be colocated in the kernel.
>
> Therefore, vulnerabilities in the process server will be almost
> equivalent to kernel vulnerabilities, so it will be written in Rust
> for better memory safety and will be kept as minimal as is reasonably
> possible.
> _______________________________________________
> Devel mailing list -- devel@sel4.systems
> To unsubscribe send an email to devel-leave@sel4.systems
>
_______________________________________________
Devel mailing list -- devel@sel4.systems
To unsubscribe send an email to devel-leave@sel4.systems

Reply via email to