Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add seccomp test for sandboxed environments #4766

Closed
goatgoose opened this issue Sep 12, 2024 · 0 comments · Fixed by #4768
Closed

Add seccomp test for sandboxed environments #4766

goatgoose opened this issue Sep 12, 2024 · 0 comments · Fixed by #4768

Comments

@goatgoose
Copy link
Contributor

Problem:

Some applications use s2n-tls in a sandboxed environment which restricts the syscalls that a process is able to make. After s2n_init(), only essential syscalls should be performed to increase compatibility in these environments. A test should be added which initializes s2n-tls, enables seccomop with the necessary syscalls permitted, and performs a handshake, ensuring that unexpected syscalls aren't made.

Changes may need to be made to s2n_init() in order to avoid lazily initializing libcrypto features that make syscalls. See: https://github.com/aws/aws-lc/blob/3c221518cc8f054209112f71b233c2404c5a8a3e/include/openssl/crypto.h#L75

AWS-LC added a similar test that we may be able to borrow from: aws/aws-lc#1835

Solution:

Add a seccomp test to ensure that s2n-tls is able to run in sandboxed environments.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant