| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
ok djm markus
|
| |
|
|
|
|
|
| |
update your kernels and sshd soon.. libc will start using sendsyslog()
in about 4 days.
|
|
|
|
|
|
|
| |
arc4random(3), we can disallow __sysctl(2) in OpenSSH's systrace
sandbox.
ok djm
|
|
|
|
| |
from matthew
|
|
|
|
| |
ok djm dtucker
|
|
|
|
| |
from portable
|
|
|
|
|
| |
keepalives and rekeying will work properly over clock steps. Suggested by
markus@, "looks good" djm@.
|
|
|
|
|
|
| |
the read-syscall and wait forever for systrace-answers) by replacing
the read/write synchronisation with SIGSTOP/SIGCONT;
report and help hshoexer@; ok djm@, dtucker@
|
|
|
|
| |
sandbox" since malloc now uses it. From johnw.mail at gmail com.
|
|
|
|
|
| |
will call open() to do strerror() when NLS is enabled;
feedback and ok markus@
|
| |
|
| |
|
|
This introduces a new "UsePrivilegeSeparation=sandbox" option for
sshd_config that applies mandatory restrictions on the syscalls the
privsep child can perform. This prevents a compromised privsep child
from being used to attack other hosts (by opening sockets and proxying)
or probing local kernel attack surface.
The sandbox is implemented using systrace(4) in unsupervised "fast-path"
mode, where a list of permitted syscalls is supplied. Any syscall not
on the list results in SIGKILL being sent to the privsep child. Note
that this requires a kernel with the new SYSTR_POLICY_KILL option.
UsePrivilegeSeparation=sandbox will become the default in the future
so please start testing it now.
feedback dtucker@; ok markus@
|