• Stars
    star
    385
  • Rank 107,413 (Top 3 %)
  • Language
    C
  • License
    BSD 3-Clause "New...
  • Created almost 4 years ago
  • Updated 11 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Simple Linux seccomp rules without writing any code

sandbox

Linux seccomp made easy

This package provides a simple way to enable basic seccomp system call filtering in any application (even proprietary one) via environment variables. It is very similar to SystemCallFilter= functionality in systemd, but with some advantages:

  • it doesn't have some of systemd limitations:

    the execve, exit, exit_group, getrlimit, rt_sigreturn, sigreturn system calls and the system calls for querying time and sleeping are implicitly whitelisted...

  • it can provide tighter filtering for dynamically linked binaries

Building

The build system expects a recent version of libseccomp to be available as a static library. It is recommended to build it from upstream source rather than rely on the version from a particular distribution.

The Makefile will look for a valid libseccomp tree and the build in the libseccomp directory, so the easiest way to satisfy the dependency is to do the following in the project directory:

user@dev:~/sandbox$ curl -L -O https://github.com/seccomp/libseccomp/releases/download/v2.4.3/libseccomp-2.4.3.tar.gz
user@dev:~/sandbox$ tar xf libseccomp-2.4.3.tar.gz && mv libseccomp-2.4.3 libseccomp
user@dev:~/sandbox$ cd libseccomp && ./configure --enable-shared=no && make

Then build sandbox with make from the project directory:

user@dev:~/sandbox$ make
cc -c -fPIC -Ilibseccomp/include -o sandbox.o sandbox.c
cc -c -fPIC -Ilibseccomp/include -o preload.o preload.c
cc -shared -Wl,--version-script=libsandbox.version -o libsandbox.so sandbox.o preload.o libseccomp/src/.libs/libseccomp.a
cc -c -fPIC -Ilibseccomp/include -o sandboxify.o sandboxify.c
cc -o sandboxify sandboxify.o sandbox.o libseccomp/src/.libs/libseccomp.a

Usage

The package provides a dynamically linked library libsandbox.so for dynamically linked executables and a command line utility sandboxify for statically linked executables. The system call filter can be defined with the following environment variables:

  • if SECCOMP_SYSCALL_ALLOW is defined, all system calls listed in the list will be allowed; if the process will attempt to call any system call not from the list, it will be killed by the operating system
    • example: SECCOMP_SYSCALL_ALLOW="open:write"
  • otherwise, if SECCOMP_SYSCALL_DENY is defined, all system calls listed in the list attempted to be used by the process, will cause the process to be killed; all other system calls are allowed
    • example: SECCOMP_SYSCALL_DENY="execve:mprotect"

Dynamically linked executables

For dynamically linked executables the sandboxing code is injected using the LD_PRELOAD dynamic linker option.

No sandboxing:

$ ./helloworld
Hello, world!

With sandboxing:

$ LD_PRELOAD=/usr/lib/x86_64-linux-gnu/libsandbox.so SECCOMP_SYSCALL_ALLOW="fstat:write:exit_group" ./helloworld
adding fstat to the process seccomp filter
adding write to the process seccomp filter
adding exit_group to the process seccomp filter
Hello, world!

If the process uses a system call, which was not explicitly listed:

$ LD_PRELOAD=/usr/lib/x86_64-linux-gnu/libsandbox.so SECCOMP_SYSCALL_ALLOW="fstat:exit_group" ./helloworld
adding fstat to the process seccomp filter
adding exit_group to the process seccomp filter
Bad system call

and a audit event is generated:

[Mon Apr  6 11:27:30 2020] audit: type=1326 audit(1586168850.755:5): auid=1000 uid=1000 gid=1000 ses=2 subj=kernel pid=3148 comm="helloworld" exe="/home/ignat/git/sandbox/helloworld" sig=31 arch=c000003e syscall=1 compat=0 ip=0x7f6c3650e504 code=0x80000000
Make it permanent

It is possible to permanently link the executable to libsandbox.so without recompiling the code and avoid defining LD_PRELOAD environment variable. For example:

Before:

$ ldd ./helloworld
	linux-vdso.so.1 (0x00007ffd2018e000)
	libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6 (0x00007f8392ee9000)
	/lib64/ld-linux-x86-64.so.2 (0x00007f83930bd000)

Adding libsandbox.so as a runtime dependency:

$ patchelf --add-needed /usr/lib/x86_64-linux-gnu/libsandbox.so ./helloworld
$ ldd ./helloworld
	linux-vdso.so.1 (0x00007fffb74cf000)
	/usr/lib/x86_64-linux-gnu/libsandbox.so (0x00007f3706499000)
	libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6 (0x00007f37062cc000)
	/lib64/ld-linux-x86-64.so.2 (0x00007f37064ee000)
$ SECCOMP_SYSCALL_ALLOW="fstat:write:exit_group" ./helloworld
adding fstat to the process seccomp filter
adding write to the process seccomp filter
adding exit_group to the process seccomp filter
Hello, world!

Statically linked executables

For statically linked executables the sandboxing code is injected by launching the application with sandboxify command line utility.

$ SECCOMP_SYSCALL_ALLOW="brk:arch_prctl:uname:readlink:fstat:write:exit_group" sandboxify ./helloworld
adding brk to the process seccomp filter
adding arch_prctl to the process seccomp filter
adding uname to the process seccomp filter
adding readlink to the process seccomp filter
adding fstat to the process seccomp filter
adding write to the process seccomp filter
adding exit_group to the process seccomp filter
Hello, world!

Under the hood sandboxify uses PTRACE_O_SUSPEND_SECCOMP ptrace option, therefore requires CAP_SYS_ADMIN capability to operate properly. Depending on the target system Yama LSM configuration sandboxify might also require CAP_SYS_PTRACE capability.

permissive (log) mode

When sandboxing new applications it is usually not very clear what system calls it uses to define the proper seccomp filter, so on initial stages it is possible to configure the sandbox to log filter violations instead of immediately killing the process via SECCOMP_DEFAULT_ACTION=log environment variable.

$ LD_PRELOAD=/usr/lib/x86_64-linux-gnu/libsandbox.so SECCOMP_SYSCALL_ALLOW="" SECCOMP_DEFAULT_ACTION=log ./helloworld
Hello, world!

Above filter does not allow any system call for the helloworld application, but logs the violations instead of killing the process. The violations can be monitored via dmesg or auditd (if running on the system):

[Mon Apr  6 12:04:02 2020] audit: type=1326 audit(1586171042.680:138): auid=1000 uid=1000 gid=1000 ses=2 subj=kernel pid=3284 comm="helloworld" exe="/home/ignat/git/sandbox/helloworld" sig=0 arch=c000003e syscall=5 compat=0 ip=0x7f21a2d42af3 code=0x7ffc0000
[Mon Apr  6 12:04:02 2020] audit: type=1326 audit(1586171042.680:139): auid=1000 uid=1000 gid=1000 ses=2 subj=kernel pid=3284 comm="helloworld" exe="/home/ignat/git/sandbox/helloworld" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f21a2d43504 code=0x7ffc0000
[Mon Apr  6 12:04:02 2020] audit: type=1326 audit(1586171042.680:140): auid=1000 uid=1000 gid=1000 ses=2 subj=kernel pid=3284 comm="helloworld" exe="/home/ignat/git/sandbox/helloworld" sig=0 arch=c000003e syscall=231 compat=0 ip=0x7f21a2d1f9d6 code=0x7ffc0000

The example above shows helloworld binary tried to use system calls 5, 1 and 231. By searching online, for example here: it is possible to translate the numbers into system call names: fstat, write and exit_group respectively.

sandboxify vs libsandbox.so

While it is possible to use sandboxify utility for dynamically linked executables as well, libsandbox.so has the advantage of being executed later in the process startup, usually after all runtime framework initialisation has been completed. This results in a much tighter seccomp filter, as explicitly allowing system calls, which are used only during process startup, is not required.

For example, if we attempt to use sandboxify to secure dynamically linked helloworld application from above, instead of SECCOMP_SYSCALL_ALLOW="fstat:write:exit_group" we would need SECCOMP_SYSCALL_ALLOW="brk:access:openat:fstat:mmap:close:read:mprotect:munmap:arch_prctl:write:exit_group" to allow all the system calls the dynamic linker and the C-runtime need to setup the process.

Check the status

It is possible to use /proc/[pid]/status to verify the target process has a seccomp policy applied by checking the Seccomp field in the output (it has to be set to 2):

$ grep Seccomp /proc/self/status
Seccomp:	0
$ LD_PRELOAD=/usr/lib/x86_64-linux-gnu/libsandbox.so SECCOMP_SYSCALL_ALLOW="brk:close:exit_group:fstat:futex:mmap:openat:read:rt_sigaction:sigaltstack:stat:write" SECCOMP_DEFAULT_ACTION=log grep Seccomp /proc/self/status
adding brk to the process seccomp filter
adding close to the process seccomp filter
adding exit_group to the process seccomp filter
adding fstat to the process seccomp filter
adding futex to the process seccomp filter
adding mmap to the process seccomp filter
adding openat to the process seccomp filter
adding read to the process seccomp filter
adding rt_sigaction to the process seccomp filter
adding sigaltstack to the process seccomp filter
adding stat to the process seccomp filter
adding write to the process seccomp filter
Seccomp:	2

Unfortunately, the field only indicates that some policy was applied, but provides no further details.

Currently not supported

  • filters based on specific system call arguments
  • custom return error codes

More Repositories

1

quiche

🥧 Savoury implementation of the QUIC transport protocol and HTTP/3
Rust
8,654
star
2

cfssl

CFSSL: Cloudflare's PKI and TLS toolkit
Go
8,049
star
3

cloudflared

Cloudflare Tunnel client (formerly Argo Tunnel)
Go
5,870
star
4

boringtun

Userspace WireGuard® Implementation in Rust
Rust
5,768
star
5

workerd

The JavaScript / Wasm runtime that powers Cloudflare Workers
C++
5,699
star
6

flan

A pretty sweet vulnerability scanner
Python
3,910
star
7

miniflare

🔥 Fully-local simulator for Cloudflare Workers. For the latest version, see https://github.com/cloudflare/workers-sdk/tree/main/packages/miniflare.
TypeScript
3,656
star
8

wrangler-legacy

🤠 Home to Wrangler v1 (deprecated)
Rust
3,233
star
9

cloudflare-docs

Cloudflare’s documentation
CSS
2,578
star
10

tableflip

Graceful process restarts in Go
Go
2,549
star
11

workers-rs

Write Cloudflare Workers in 100% Rust via WebAssembly
Rust
2,182
star
12

workers-sdk

⛅️ Home to Wrangler, the CLI for Cloudflare Workers®
TypeScript
2,047
star
13

wildebeest

Wildebeest is an ActivityPub and Mastodon-compatible server
TypeScript
2,026
star
14

gokey

A simple vaultless password manager in Go
Go
1,836
star
15

ebpf_exporter

Prometheus exporter for custom eBPF metrics
C
1,639
star
16

lol-html

Low output latency streaming HTML parser/rewriter with CSS selector-based API
Rust
1,388
star
17

redoctober

Go server for two-man rule style file encryption and decryption.
Go
1,373
star
18

cf-ui

💎 Cloudflare UI Framework
JavaScript
1,297
star
19

sslconfig

Cloudflare's Internet facing SSL configuration
1,287
star
20

cloudflare-go

Go library for the Cloudflare v4 API
Go
1,246
star
21

foundations

Cloudflare's Rust service foundations library.
Rust
1,163
star
22

hellogopher

Hellogopher: "just clone and make" your conventional Go project
Makefile
1,153
star
23

production-saas

(WIP) Example SaaS application built in public on the Cloudflare stack!
TypeScript
1,099
star
24

bpftools

BPF Tools - packet analyst toolkit
Python
1,087
star
25

cloudflare-blog

Cloudflare Blog code samples
C
1,065
star
26

wrangler-action

🧙‍♀️ easily deploy cloudflare workers applications using wrangler and github actions
TypeScript
993
star
27

templates

A collection of starter templates and examples for Cloudflare Workers and Pages
JavaScript
979
star
28

circl

CIRCL: Cloudflare Interoperable Reusable Cryptographic Library
Go
970
star
29

wirefilter

An execution engine for Wireshark-like filters
Rust
913
star
30

pingora

A library for building fast, reliable and evolvable network services.
Rust
896
star
31

next-on-pages

CLI to build and develop Next.js apps for Cloudflare Pages
TypeScript
845
star
32

utahfs

UtahFS is an encrypted storage system that provides a user-friendly FUSE drive backed by cloud storage.
Go
805
star
33

cf-terraforming

A command line utility to facilitate terraforming your existing Cloudflare resources.
Go
793
star
34

workers-chat-demo

JavaScript
779
star
35

pint

Prometheus rule linter/validator
Go
772
star
36

Stout

A reliable static website deploy tool
Go
749
star
37

goflow

The high-scalability sFlow/NetFlow/IPFIX collector used internally at Cloudflare.
Go
729
star
38

unsee

Alert dashboard for Prometheus Alertmanager
Go
710
star
39

terraform-provider-cloudflare

Cloudflare Terraform Provider
Go
704
star
40

mitmengine

A MITM (monster-in-the-middle) detection tool. Used to build MALCOLM:
Go
690
star
41

workers-graphql-server

🔥Lightning-fast, globally distributed Apollo GraphQL server, deployed at the edge using Cloudflare Workers
JavaScript
635
star
42

react-gateway

Render React DOM into a new context (aka "Portal")
JavaScript
569
star
43

xdpcap

tcpdump like XDP packet capture
Go
567
star
44

cloudflare-php

PHP library for the Cloudflare v4 API
PHP
566
star
45

ahocorasick

A Golang implementation of the Aho-Corasick string matching algorithm
Go
541
star
46

lua-resty-logger-socket

Raw-socket-based Logger Library for Nginx (based on ngx_lua)
Perl
477
star
47

nginx-google-oauth

Lua module to add Google OAuth to nginx
Lua
425
star
48

gokeyless

Go implementation of the keyless protocol
Go
420
star
49

worker-typescript-template

ʕ •́؈•̀) TypeScript template for Cloudflare Workers
TypeScript
416
star
50

golibs

Various small golang libraries
Go
402
star
51

stpyv8

Python 3 and JavaScript interoperability. Successor To PyV8 (https://github.com/flier/pyv8)
C++
388
star
52

mmap-sync

Rust library for concurrent data access, using memory-mapped files, zero-copy deserialization, and wait-free synchronization.
Rust
380
star
53

speedtest

Component to perform network speed tests against Cloudflare's edge network
JavaScript
371
star
54

mmproxy

mmproxy, the magical PROXY protocol gateway
C
370
star
55

pages-action

JavaScript
355
star
56

rustwasm-worker-template

A template for kick starting a Cloudflare Worker project using workers-rs. Write your Cloudflare Worker entirely in Rust!
Rust
350
star
57

workers-types

TypeScript type definitions for authoring Cloudflare Workers.
TypeScript
350
star
58

cobweb

COBOL to WebAssembly compiler
COBOL
345
star
59

cloudflare-ingress-controller

A Kubernetes ingress controller for Cloudflare's Argo Tunnels
Go
344
star
60

lua-resty-cookie

Lua library for HTTP cookie manipulations for OpenResty/ngx_lua
Perl
340
star
61

svg-hush

Make it safe to serve untrusted SVG files
Rust
333
star
62

boring

BoringSSL bindings for the Rust programming language.
Rust
330
star
63

node-cloudflare

Node.js API for Client API
JavaScript
319
star
64

cfweb3

JavaScript
309
star
65

workerskv.gui

(WIP) A cross-platform Desktop application for exploring Workers KV Namespace data
Svelte
307
star
66

JSON.is

Open-source documentation for common JSON formats.
JavaScript
302
star
67

sqlalchemy-clickhouse

Python
299
star
68

cloudflare.github.io

Cloudflare ❤️ Open Source
CSS
298
star
69

json-schema-tools

Packages for working with JSON Schema and JSON Hyper-Schema
JavaScript
296
star
70

chatgpt-plugin

Build ChatGPT plugins with Cloudflare's Developer Platform 🤖
JavaScript
290
star
71

tls-tris

crypto/tls, now with 100% more 1.3. THE API IS NOT STABLE AND DOCUMENTATION IS NOT GUARANTEED.
Go
283
star
72

gortr

The RPKI-to-Router server used at Cloudflare
Go
283
star
73

react-modal2

💭 Simple modal component for React.
JavaScript
279
star
74

doom-wasm

Chocolate Doom WebAssembly port with WebSockets support
C
273
star
75

keyless

Cloudflare's Keyless SSL Server Reference Implementation
C
272
star
76

isbgpsafeyet.com

Is BGP safe yet?
HTML
262
star
77

go

Go with Cloudflare experimental patches
Go
260
star
78

dog

Durable Object Groups
TypeScript
255
star
79

kv-asset-handler

Routes requests to KV assets
TypeScript
244
star
80

mod_cloudflare

C
243
star
81

tubular

BSD socket API on steroids
C
242
star
82

semver_bash

Semantic Versioning in Bash
Shell
238
star
83

cloudflare-rs

Rust library for the Cloudflare v4 API
Rust
236
star
84

cfssl_trust

CFSSL's CA trust store repository
Go
226
star
85

doca

A CLI tool that scaffolds API documentation based on JSON HyperSchemas.
JavaScript
224
star
86

pmtud

Path MTU daemon - broadcast lost ICMP packets on ECMP networks
C
218
star
87

alertmanager2es

Receives HTTP webhook notifications from AlertManager and inserts them into an Elasticsearch index for searching and analysis
Go
218
star
88

itty-router-openapi

OpenAPI 3 and 3.1 schema generator and validator for Cloudflare Workers
TypeScript
218
star
89

origin-ca-issuer

Go
216
star
90

worker-template-router

JavaScript
216
star
91

cloudflare-docs-engine

A documentation engine built on Gatsby, powering Cloudflare’s docs https://github.com/cloudflare/cloudflare-docs
JavaScript
215
star
92

python-worker-hello-world

Python hello world for Cloudflare Workers
JavaScript
209
star
93

saffron

The cron parser powering Cron Triggers on Cloudflare Workers
Rust
207
star
94

Cloudflare-WordPress

A Cloudflare plugin for WordPress
PHP
204
star
95

certmgr

Automated certificate management using a CFSSL CA.
Go
202
star
96

collapsify

Collapsify inlines all the resources of a page into a single document
JavaScript
200
star
97

worker-speedtest-template

JavaScript
195
star
98

har-sanitizer

TypeScript
192
star
99

zkp-ecdsa

Proves knowledge of an ECDSA-P256 signature under one of many public keys that are stored in a list.
TypeScript
187
star
100

shellflip

Graceful process restarts in Rust
Rust
183
star