Recursive Sandboxes: Extending Systrace To Empower Applications

Kurchuk, Aleksey; Keromytis, Angelos D.

The systrace system-call interposition mechanism has become a popular method for containing untrusted code through program-specific policies enforced by user-level daemons. We describe our extensions to systrace that allow sandboxed processes to further limit their children processes by issuing dynamically constructed policies. We discuss our extensions to the systrace daemon and the OpenBSD kernel, as well as a simple API for constructing simple policies. We present two separate implementations of our scheme, and compare their performance with the base systrace system. We show how our extensions can be used by processes such as ftpd, sendmail, and sshd.



Also Published In

Security and protection in information processing systems: IFIP 18th world computer congress: TC11 19th international information security conference, 22-27 August 2004, Toulouse, France.
Kluwer Academic Publishers

More About This Work

Academic Units
Computer Science
IFIP International Federation for Information Processing, 147
Published Here
July 5, 2012