Hi.

with a public SmallHarbour (public fork of SeasideHosting - smallharbour.org)
> people can upload images that do bad things: change filesystem, run
> commands, ....


, users, services...
I don't know about freebsd, but I hear about jails and its advantages over
chroot.
http://www.freebsd.org/doc/handbook/jails-intro.html


2011/8/8 Miguel Moquillon <[email protected]>

> If the host of SmallHarbour is running with FreeBSD 8 or Solaris, you can
> use the "capabilities" feature to give restrictive priviledges to the
> program or to some parts of the program. In short a capability is a pair of
> a reference to an object in the system with the rights on that object. You
> can allocate to the program a set of capabilities that define the security
> environment within which it will run.
>
> Mig
>
> Le 06/08/2011 14:31, Dale Henrichs a écrit :
>
>  Laurent,
>>
>> I think that the best defense is the limited access/rights unix account,
>> perhaps even a separate unix user per account (to provide isolation between
>> accounts) ... I think this is what VMware does in in its Cloud Foundry ...
>> to be completely safe you'd have to turn off the ability to read and write
>> files and turn off socket access (this is what javascript in the browser
>> does), but going this far severely limits what you can do in the image ... I
>> would think that you could screw things down pretty tight just using unix
>> permissions ....
>>
>> Dale
>>
>> ----- Original Message -----
>> | From: "laurent laffont"<[email protected]>
>> | To: "Seaside - developer list"<[email protected]>,
>> "An open mailing list to discuss any topics
>> | related to an open-source Smalltalk"<
>> [email protected]>
>> | Sent: Saturday, August 6, 2011 3:06:38 AM
>> | Subject: [Pharo-project] Web app security
>> |
>> | Hi,
>> |
>> |
>> | with a public SmallHarbour (public fork of SeasideHosting -
>> | smallharbour.org ) people can upload images that do bad things:
>> | change filesystem, run commands, ....
>> |
>> |
>> | Actually, what are the ways of securing a server so people can't do
>> | bad things ?
>> |
>> |
>> | I'm thinking of:
>> | - run the vm/image within a low right unix account
>> | - remove dangerous plugins (OSProcess, ?)
>> |
>> |
>> | Can we easily chroot ?
>> |
>> |
>> | what are known solutions ?
>> |
>> |
>> | Laurent.
>>
>>
>
>

Reply via email to