Re: RFC: seccomp-bpf support
От | Tom Lane |
---|---|
Тема | Re: RFC: seccomp-bpf support |
Дата | |
Msg-id | 26115.1567018681@sss.pgh.pa.us обсуждение исходный текст |
Ответ на | Re: RFC: seccomp-bpf support (Andres Freund <andres@anarazel.de>) |
Список | pgsql-hackers |
Andres Freund <andres@anarazel.de> writes: > On 2019-08-28 14:30:20 -0400, Tom Lane wrote: >> Admittedly, you can't get per-subprocess restrictions that way, but the >> incremental value from that seems *really* tiny. If listen() has a bug >> you need to fix the bug, not invent this amount of rickety infrastructure >> to limit who can call it. > And, as I mentioned in another email, once you can corrupt shared memory > in arbitrary ways, the differing restrictions aren't worth much > anyway. Postmaster might be separated out enough to survive attacks like > that, but backends definitely aren't. Another point in this area is that if you did feel a need for per-process syscall sets, having a restriction that the postmaster's allowed set be a superset of all the childrens' allowed sets seems quite the wrong thing. The set of calls the postmaster needs is probably a lot smaller than what the children need, seeing that it does so little. It's just different because it includes bind+listen which the children likely don't need. So the hierarchical way seccomp goes about this seems fairly wrong for our purposes regardless. regards, tom lane
В списке pgsql-hackers по дате отправления: