The real question is when are we going to give HV containers to app developers and when can we get enough density and perf. I believe in @mamyun ;)
-
Show this thread
-
Replying to @dwizzzleMSFT @mamyun
I don't see why it couldn't work, seccomp-bpf doesn't require you to be a libc developer. I think HV containers solve a different problem.
2 replies 0 retweets 2 likes -
Replying to @taviso @dwizzzleMSFT
NT/win32k syscalls are more or less abstracted from the public API. So, exposing syscall filtering at that level would be fragile as we update Windows and as apps evolve. It needs to be exposed at a higher level. We're investigating...
2 replies 0 retweets 1 like -
It’s worse than that. You have NtUserMessageCall and the like which have dozens or hundreds of sub functions based on message type. Many APIs generate implicit messages. Blocking at the entry point level is way to coarse to get comparable security value to seccomp
1 reply 0 retweets 2 likes -
Replying to @dwizzzleMSFT @mamyun
That's just plain not true Dave, it sounds like you think seccomp-bpf is just filtering based on syscall number. The "bpf" part means that there is a little turing complete program that can examine parameters, such as class or message type, and decide an action.
4 replies 1 retweet 8 likes -
I've very familiar with seccomp-bpf and what it can do :) My point is finding the APIs is hard enough, but not close to sufficient. I think total cost/work involved for developers to build an effective filter on windows is massive
2 replies 0 retweets 3 likes -
Agree with this. It is microsofts biggest security failing imo. You need like a PhD in windows to write a half decent sandbox. Knowledge of SDs, low integrity, low box, jobs, desktops, sessions, and semi or undocumented process flags
2 replies 0 retweets 3 likes -
Yeah 100% agree it’s not good enough. I own the sandbox now and a better/real public api is at the top of the list
2 replies 0 retweets 1 like -
Replying to @dwizzzleMSFT @mdowd and
"AppJailLauncher" was our humble contribution. Originally made with Windows CTF challenges in mind, I'm not sure if it will work on more complex applications.https://github.com/trailofbits/appjaillauncher-rs …
2 replies 0 retweets 5 likes -
Replying to @dguido @dwizzzleMSFT and
Yeah this looks pretty good but I think the OS vendor needs to bake this kind of API in to the system so third party additions aren’t required for developing applications with decent security constraints
1 reply 0 retweets 0 likes
I’m with you 100%
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.