[LINK] RFI: Sandboxing
Glen Turner
gdt at gdt.id.au
Thu Jul 23 10:16:49 AEST 2015
Roger Clarke wrote:
> 'really tight sandboxing', is an absolute must
Security isn't that simple.
Consider an operating system with each application in its own sandbox. Now
let's say a linker library has a bug. We need to update that library in
every single sandbox. In the "application shipped as a sandbox" model
(phones, Docker) then you're relying on application authors to update
their shipped applications, but they have little motivation to do so (they
aren't going to see additional revenue, customers lack sufficient market
information when purchasing the application to know how diligent the
author is with security updates). In the non-sandboxed model an update
from the operating system's manufacturer suffices to update all
applications (OS authors have an expectation of future sales, and their
performance at issuing security updates is widely reported).
This shortcoming of sandboxes explains the attraction of alternative
security mechanisms which seek to limit unauthorised access to the
operating system (SELinux, etc). The issue there also becomes one of
management: who is responsible for the authoring of the type enforcement
rules (neither the application author nor the operating systems'
manufacturer feels the cost should fall upon them)?
Neither of these might give you the security you want. Sandboxes and type
enforcement usually degenerate to protecting the operating system from
misuse. That often doesn't do much to prevent manipulation of your data pr
misuse of your systems resources. Sandboxed applications typically ask for
far too much access to your data (just look at the Facebook app's landgrab
over your phone's data) and type enforcement schemes often don't apply to
your data at all.
There's no magic bullet here, or this would be a solved problem with the
one obviously right answer already deployed.
-glen
--
Glen Turner <http://www.gdt.id.au/~gdt/>
More information about the Link
mailing list