Hello,

As a user i come across one use case
where i m thinking : i do not want any program/exec
to modify base  or local base (  (/usr and /bin /bsd etc.. )
except syspatch and pkg_add -u.

Please stop and tell if it does not make sense.

I did look at pledge(2) and mount as pledge may force rdonly
and mount as wxallowed.

I did not really find a clever way to enforce pkg_add and syspatch
to be the only binaries to actually write in usr/local and base 'stuff'.

Because mount can have multiple device on one patch i was tricked to think,
it would be fun to mount one device in multiple place ( rdonly ) and one
time rw.
Which would somewhat allow to chroot to a writable system before running
syspatch.

Another way would to force every program to be pledge rdonly by default on
non /var
/tmp path and the force some kind of flag to allow writing in specific path.
Like wxallowed, but pledgewrite, then the binary would call pledge() and
gain write access.

Maybe a bit too complex and strange.

If you read that far, thank you, can you think of a clever way to enforce
this policy
without heavily modifying the base ?

Best.


-- 
--
---------------------------------------------------------------------------------------------------------------------
Knowing is not enough; we must apply. Willing is not enough; we must do

Reply via email to