[Bug 2107] New: seccomp sandbox breaks GSSAPI

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Sat May 18 07:34:54 EST 2013


https://bugzilla.mindrot.org/show_bug.cgi?id=2107

            Bug ID: 2107
           Summary: seccomp sandbox breaks GSSAPI
    Classification: Unclassified
           Product: Portable OpenSSH
           Version: 6.2p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: Kerberos support
          Assignee: unassigned-bugs at mindrot.org
          Reporter: cjwatson at debian.org

Created attachment 2273
  --> https://bugzilla.mindrot.org/attachment.cgi?id=2273&action=edit
Handle ssh_gssapi_supported_oids in monitor for seccomp sandbox
compatibility

One of my test installations happens to have "GSSAPIAuthentication
yes", and this breaks with the seccomp sandbox.  Initially I assumed
this was specific to Simon Wilkinson's GSSAPI key exchange patch (which
I apply in Debian), but on further investigation I found that that just
causes the failure to happen earlier.  Specifically, the regression
test included in the patch I'm attaching to this bug fails if applied
in isolation.

The syscalls that are denied are, on Linux/i386, futex and stat64. 
These are used by gss_indicate_mechs, called by
ssh_gssapi_supported_oids.  futex probably doesn't matter much, but I'm
not happy about opening up stat and friends, so I think it makes more
sense to add a monitor protocol command for this function so that the
sandboxed network child doesn't have to call it directly.  Would you
consider something like the attached patch, implementing this?

-- 
You are receiving this mail because:
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list