Dan Walsh Red Hat, Inc. <dwalsh@redhat.com> Sandbox Dan Walsh Red Hat, Inc. <dwalsh@redhat.com>

Slides:



Advertisements
Similar presentations
12-1 VMware HA in Action VC Server ESX Server Virtual Machine B Virtual Machine C ESX Server Virtual Machine D Virtual Machine A Virtual Machine E Virtual.
Advertisements

Internet Information Server 6.0. IIS 6.0 Enhancements  Fundamental changes, aimed at: Reliability & Availability Reliability & Availability Performance.
CWE-732 Incorrect Permission Assignment for Critical Resource
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Overview Basic functions Features Installation: Windows host and Linux host.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
26/4/2001VMware - HEPix - LAL 2001 Windows/Linux Coexistence : VMware Approach HEPix – LAL Apr Michel Jouvin
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
LINUX System : Lecture 3 Vmware, Cygwin, LINUX installation Bong-Soo Sohn Assistant Professor School of Computer Science and Engineering Chung-Ang University.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
CSAS 2009 Running Windows as a Non- Administrator or how I learned to love “User” By: Kasey Dennler.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Linux Security LINUX SECURITY. Firewall Linux Security Internet Database Application Web Server Firewall.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Module 5: Configuring Internet Explorer and Supporting Applications.
“The New Sequencer”. Application Virtualization » Encapsulate App, not entire OS » Solves conflict between apps » Solves conflict between users and apps.
How to implement GPOs and secure a MS Windows Environment with little to NO user awareness!?!?
SCSC 455 Computer Security Chapter 3 User Security.
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
INFSO-RI ETICS Local Setup Experiences A Case Study for Installation at Customers Location 4th. All Hands MeetingUwe Müller-Wilm VEGA Bologna, Nov.
Internet Information Server 6.0 & new management features.
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
User Mode Linux (UML): An overview and experiences. Matthew Grove SLUG Tech Talk Red Hat Europe 12 th January 2007.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Linux and Coldfusion MX Mid-Michigan Coldfusion User’s Group, Nov
 systemD  FirewallD  Network manager (NMCLI)  Target CLI (iscsi targets)  GRUB 2 (Booting process)  Network teamnig & bridging.
Windows Vista Configuration MCTS : Network Security.
Course : PGClass : MCA Subject: Operating SystemSub.Code : 3CT11 Staff Name : S.SomasundaramYear & Sem : II nd & III rd.
SELinux Sandbox Daniel Walsh Red Hat. What is a sandbox ➔ Run general applications in a locked down environment. ➔ Less privileged then other processes.
SELinux Overview Dan Walsh SELinux for Dummies Dan Walsh
What is SELinux trying to tell me? The 4 key causes of SELinux errors.
10/2/2016 Secure Virtualization Using SELinux Daniel J Walsh
Multi-Category Security (MCS)
OpenShift & SELinux Dan Walsh Twitter: #rhatdan
ArcGIS for Server Security: Advanced
A Quick Tour of Ceedo Safe Browsing and Remote Access Protection.
Objective % Select and utilize tools to design and develop websites.
Linux Security Presenter: Dolev Farhi |
application into a Flatpak
The Architecture of oVirt Node
Linux Containers Overview & Roadmap
Demystifying SELinux: WTF is it saying?
Chapter 11: Managing Users
Fedora Kiosk Spin Daniel Walsh Red Hat.
Gnome SDK A better way to ship apps Alexander Larsson Red Hat, Inc
Managing Windows XP Security
AppArmor LSM Update Introduce self John Johansen.
Structure of Unix OS.
CS490 Windows Internals Quiz 2 09/27/2013.
Introduction to Networking
Containers in HPC By Raja.
Objective % Select and utilize tools to design and develop websites.
Get Oracle 8i Running on Your Linux Server Straight Away!
Latest Free Exam Questions - Free Full Training
Download dumps - Microsoft Real Exam Questions Dumps4download
Utilize Group Policy Terminal Server Settings
What Power BI users need to know about R
Information Security Session October 24, 2005
Chapter 10: Supporting and Maintaining Desktop Applications
IS3440 Linux Security Unit 4 Securing the Linux Filesystem
Processes and Threads.
OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4)
Operating System Security
Radoslaw Jedynak, PhD Poland, Technical University of Radom
SUSE Linux Enterprise Desktop Administration
Managing Windows XP Security
Preparing for the Windows 8.1 MCSA
Presentation transcript:

Dan Walsh Red Hat, Inc. <dwalsh@redhat.com> Sandbox Dan Walsh Red Hat, Inc. <dwalsh@redhat.com>

What is a sandbox Run general applications in a locked down environment. Less privileged then other processes run by the user. Block Networking Block Access to other Processes Block Access to files, homedir? Block Access to resources like X, dbus Run untrusted applications or filters on untrusted data.

What is SELinux sandbox? Two Sandbox in one Simple sandbox allows process access to stdin/stdout/and other passed in file descriptors Read/Execute on all other apps. X Sandbox Replace $HOME and /tmp Use Different X Server Lock down by SELinux NO setuid, No Network, No access to user content

What is new in F13/RHEL6?

CGROUP Integration sandbox -C /etc/sysconfig/sandbox CPUAFFINITY - cpus that all sandboxes will run on Values ALL (default) or comma-separated Ex: 0-2,5 MEMUSAGE – Total memory for sandboxes 80% (default) – Or specify use suffixes (K, M, G) 100M CPUUSAGE – Total cpu percentage for sandboxes 80%(default) Future rlimits values (Number of processes) when cgroups supports them.

SELinux context optional Seunshare – setuid tool used to setup sandbox Run sandboxes under standard current context Run sandboxes on machines with SELinux disabled Cgroup Namespace replacement of $HOME and /tmp seunshare [ -v ] [ -t tmpdir ] [ -h homedir ] [ -Z context ] -- executable [args]

Entire Desktop session sandbox -S MLS Desktop Full separation without problems of Xace Simpler configuration Future integration into gnome-shell? Alternate desktops for security Online Banking desktop Gaming Desktop Problems: Really need a way of saying which apps run within desktop

Resizable X Server Thomas Liu – rewrote a patch to allow Xephyr xservers to be resizable

Discussion?