Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Seccomp support #13

Open
dynafide opened this issue Nov 2, 2022 · 0 comments
Open

Seccomp support #13

dynafide opened this issue Nov 2, 2022 · 0 comments
Labels
enhancement New feature or request

Comments

@dynafide
Copy link
Collaborator

dynafide commented Nov 2, 2022

It may be a good idea to add seccomp support to Resurgence to further enforce secure computing. I see two ways we could implement this feature:

The first way we could implement it would look something like this:

  • When the interpreter instance is created, it also creates a new seccomp thread that listens on an internal IPC interface, such as shared memory or a FIFO pipe
  • Whenever any future calls are made to the interpreter, they are forwarded to the seccomp thread over the IPC interface
  • When the interpreter instance is destroyed, it ends the seccomp thread

This way, the seccomp functionality is completely internal to Resurgence and is abstracted away from the host application entirely.

We could also implement it the second way, which would look something like this:

  • Resurgence provides some sort of seccomp_enable and seccomp_disable functions in the API
  • The host application directly sets up and tears down the seccomp thread and runs the entire Resurgence VM inside of it

This would be more secure, but would make it much more difficult to use for developers of host applications.

@dynafide dynafide added the enhancement New feature or request label Nov 2, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant