So it looks like Gentoo is actually using chromium_renderer_t, no ?
Does gentoo use the setuid sandbox and seccomp-bpf as well ?
If yes, I'm not worried, but if no, I don't think this policy is nearly tight enough.
######################################## # # chromium_renderer local policy # allow chromium_renderer_t self:process execmem; allow chromium_renderer_t self:fifo_file rw_fifo_file_perms; allow chromium_renderer_t self:shm create_shm_perms; allow chromium_renderer_t self:unix_dgram_socket { create read sendto }; allow chromium_renderer_t self:unix_stream_socket { create getattr read write }; allow chromium_renderer_t chromium_t:fd use; allow chromium_renderer_t chromium_t:unix_stream_socket rw_stream_socket_perms; allow chromium_renderer_t chromium_tmpfs_t:file rw_file_perms; dontaudit chromium_renderer_t chromium_t:dir search; # /proc/... access dontaudit chromium_renderer_t self:process getsched; read_files_pattern(chromium_renderer_t, chromium_xdg_config_t, chromium_xdg_config_t) rw_fifo_files_pattern(chromium_renderer_t, chromium_tmp_t, chromium_tmp_t) dev_read_urand(chromium_renderer_t) files_dontaudit_list_tmp(chromium_renderer_t) files_dontaudit_read_etc_files(chromium_renderer_t) files_search_var(chromium_renderer_t) init_sigchld(chromium_renderer_t) miscfiles_read_localization(chromium_renderer_t) userdom_dontaudit_use_all_users_fds(chromium_renderer_t) userdom_use_user_terminals(chromium_renderer_t) xdg_read_config_home_files(chromium_renderer_t) xserver_user_x_domain_template(chromium_renderer, chromium_renderer_t, chromium_tmpfs_t) tunable_policy(`chromium_read_system_info',` kernel_read_kernel_sysctls(chromium_renderer_t) kernel_read_system_state(chromium_renderer_t) ',` kernel_dontaudit_read_kernel_sysctls(chromium_renderer_t) kernel_dontaudit_read_system_state(chromium_renderer_t) ')
On Thu, May 2, 2013 at 12:36 PM, Paweł Hajdan, Jr.
<phajd...@chromium.org> wrote:
> On Thu, May 2, 2013 at 12:16 PM, Julien Tinnes <j...@chromium.org> wrote:
>> Does gentoo use the setuid sandbox and seccomp-bpf as well ?Which is one is the default ? I couldn't tell if it's SELinux or
> Now - yes. Previously it wouldn't when SELinux mode was enabled. Note this
> is not the default on Gentoo.
setuid + seccomp-bpf.
If you can, please make the latter the default. It's more secure, and
actively developed (you can throw SELinux on top of course!). If the
default could show "adequately sandboxed" in about:sandbox, that would
be great.
>> If yes, I'm not worried, but if no, I don't think this policy is nearlyThe largest issue is that you have no sandbox for anything not started
>> tight enough.
from the Zygote (such as the GPU process).
For Zygote process types (renderers / workers):
- doesn't this policy allow to access anything in /tmp? (or is it only
r/w existing file descriptors?)
- to directly communicate with the X server?
- can't you access all of /proc?