Hello fossil-dev,

I am working on a project where we want to use Fossil as the data storage backend for a web application. The application is going to run on OpenBSD and we want to take advantage of the security features in OpenBSD as much as possible.

In this regard we want to reach out and ask about your opinion about adding calls to pledge() and later pledgepath() to the Fossil codebase in order to provide better attack mitigation. In some cases it may be neccesary to reorder the current code in order to make the pledges more effective. The OpenBSD developers refer to this as "hoisting" where code that needs wider permissions is moved to the top of the program and after this code has run, pledge() reduces the set of allowed system calls.

Related to this is of course the question about other platforms than OpenBSD. There are mechanisms like seccomp on Linux and capsicum on FreeBSD that can be used to accomplish some of the things that is provided by pledge on OpenBSD.

For our project we only care about OpenBSD, but it would be preferable to have this stuff included in the main Fossil codebase. Maintaining it as a local patch will most likely be too cumbersome.

What do you think? Is this desirable?

Best regards
Christian


_______________________________________________
fossil-dev mailing list
fossil-dev@mailinglists.sqlite.org
http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/fossil-dev

Reply via email to