-
Notifications
You must be signed in to change notification settings - Fork 2
Capsicum enhancements to Google's Chromium web browser
License
rwatson/chromium-capsicum
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Chromium-Capsicum README ------------------------ Chromium-Capsicum is an adapation of Google's Chromium web browser to use FreeBSD's Capsicum capability security primitives. This allows renderers (and in the future, other components) to execute in tightly-controlled sandboxes without the need for complex access control manipulations required when using traditional OS APIs. This should lead to more complete and more robust protection with significantly lower code complexity. Capsicum is a research project at the University of Cambridge Computer Laboratory, and sponsored by Google, Inc. Learn more at: http://www.cl.cam.ac.uk/research/security/capsicum/ WARNING: This is a research prototype, and should be used with caution. TODO: - Teach process management code about process descriptors... - ...allowing the Zygote to run cap_enable() out of EnterSandbox() rather than the renderer out of EnableSandbox(). - Fix closing of file descriptors when going from zygote to renderer in order to avoid leaking undesired rights into sandboxes. - Encapsulate desired file descriptors for renderers in constrained capabilities. - Consider switching back to SOCK_DGRAM from SOCK_SEQPACKET, as it appears only to be required because of limitations of the sandboxing models available on Linux. - Consider re-enabling X11 SHM and adding explicit copying from the POSIX SHM segments. - Determine whether chrome data packs are actually required in sandboxes, either as file descriptors or as memory mappings, and remove if not; they are currently wrapped in capabilities but perhaps are not needed at all. Longer-term considerations: - Use libcapability to launch sandboxes. - Delegate font directory capabilities to fontconfig rather than using a proxy service. - Extend X11 to support POSIX shared memory so that a single segment can be shared between {X11, browser, renderer} as is done with X11 SHM today when unsandboxed. - Explore additional process sandboxing present in the Mac / Windows models but not supported on Linux.
About
Capsicum enhancements to Google's Chromium web browser
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published