Rainbow: Difference between revisions
m (Reverted edits by 77.64.72.243 (Talk) to last revision by FGrose) |
|||
(118 intermediate revisions by 9 users not shown) | |||
Line 1: | Line 1: | ||
{{translations}} |
{{translations}} |
||
<noinclude>{{Google Translations}} |
|||
⚫ | |||
</noinclude>{{Rainbow page}} |
|||
The [[OLPC Bitfrost|Bitfrost]] security specification argues that existing desktop security conventions do not meet the security needs: |
|||
== Introduction == |
|||
* of adventurous kids in 1-1 computing programs, |
|||
* of the technical staff who help maintain such initiatives, and |
|||
* of the political constituencies which determine where such programs take place. |
|||
The most serious inadequacy of such systems is that they force end-users to take unnecessary security risks (for example, giving all programs a user runs access to the network, to auto-start facilities, and to other programs' data files) while simultaneously denying users the opportunity to do things which can be done safely but which were not anticipated by the system administrator (notably, installing new software or modifying the local system.) |
|||
⚫ | |||
Rainbow implements the isolation shell implicitly described in the [[OLPC Bitfrost|Bitfrost]] security specification. This means that it isolates activities (and eventually system services) that it is asked to run from one another and the rest of the system. |
|||
Rainbow is an isolation shell. This means two things: |
|||
Rainbow implements this isolation by generating a new uid (and perhaps a new gid) for each program it is asked to run. Running each activity as a separate user means that standard Unix access checks can be used as the primary 'gate' to control the visibility of activity-driven side-effects like reading from or writing to files or devices or signalling other processes. |
|||
# ''shell'': Rainbow runs programs on behalf of humans and programs. Rainbow provides those programs with a suitable environment: places in which temporary and persistent data can be stored, environment variables to identify those places, etc. |
|||
== Design and Implementation == |
|||
# ''isolation'': People and programs should use Rainbow when they want to isolate programs from other programs and important system resources. "Isolation" is already a familiar concept to most UNIX programmers: many system daemons already operate using their own unique UID and/or GID, and most have private places in which they store their configuration. Rainbow generalizes and extends this paradigm by providing every program it runs with a unique identity, with private storage, with pre-configured resource usage limits, etc. |
|||
At the moment, Rainbow only knows how to provide the same primitive form of filesystem and signal isolation that competent sysadmins provide to users of multi-user Unix shell servers. |
|||
The basic design principles of the present 0.7-series incarnation of rainbow were presented in [http://dev.laptop.org/git?p=security;a=blob;f=rainbow.txt;hb=HEAD rainbow.txt]. The implementation of rainbow can be found alongside that file in the "rainbow/rainbow" subdirectory of [http://dev.laptop.org/git/security security git repo] and in its several forks. Finally, a somewhat dated [[Taste the Rainbow|guided tour]] of the source code is available. |
|||
However, '''[[Security#Contributions|contributions]]''' are welcome, particularly contributions which advance [[Rainbow/Next Steps|existing plans]]. |
|||
== Next Steps == |
|||
'''Information about rainbow-0.8.*''' |
|||
* P_NETWORK -- [[Isolation LSM]] |
|||
⚫ | |||
* pristine root patches -- [http://dev.laptop.org/git/users/mstone/nss-rainbow nss-rainbow] |
|||
* P_DOCUMENT -- [[Olpcfs]] |
|||
* P_X -- we'll start by trying out XSECURITY (i.e. by making activities untrusted clients) and see where that leaves us. Then on to XACE as per [http://lists.laptop.org/pipermail/security/2008-April/000390.html previous discussion] |
|||
* [[Rainbow/Current Situation|current situation]]: feature, design, and implementation notes for rainbow-0.8.* |
|||
== (Outdated) Resources == |
|||
* [[Rainbow/Installation Instructions|installation instructions]] for rainbow-0.8.* |
|||
* [[Rainbow/Testing|testing]] instructions for rainbow-0.8.* |
|||
* [[Rainbow/Next Steps|next steps!]] |
|||
* [[Rainbow/Demo Ideas|demo ideas]] |
|||
'''Other Information''' |
|||
* [[Taste the Rainbow]]: A guided tour of the source code of the rainbow-0.7.8 release. |
|||
* [[OLPC Bitfrost]]: [http://dev.laptop.org/git?p=security;a=blob;f=bitfrost.txt;h=96f4997602d817abf7be90a00bf68b3a79a73005;hb=HEAD Bitfrost Spec] |
|||
* [http://dev.laptop.org/git?p=security;a=blob;f=rainbow/README;hb=HEAD README] - A description of the scope and design of Rainbow. |
|||
* [http://dev.laptop.org/git?p=security;a=blob;f=rainbow/NOTES;hb=HEAD Notes] - Useful notes on design and hurdles in developing Rainbow. |
|||
* [[Rainbow/DataStore Access]] |
|||
* [http://lists.laptop.org/pipermail/security/2008-January/000370.html "Why not SELinux?"] |
|||
* [http://lists.laptop.org/pipermail/sugar/2007-November/003725.html "Bitfrost Compliance for Update.1" announcement mail] |
|||
* notes for [[Rainbow/Information for Activity Developers|Activity Developers]], for Sugar 0.82 and rainbow-0.7.* |
|||
* [[Rainbow/Historical Designs|historical design comparisons]], for rainbow-0.6.*, -0.7.*, and -0.8.* |
|||
[[Category:Software]] |
|||
* [[Rainbow/Curiosities|curiosities]] |
|||
⚫ | |||
==Subpages== |
|||
(Titles in ''italics'' redirect to another page.){{Special:PrefixIndex/{{PAGENAME}}/}} |
Latest revision as of 21:00, 26 November 2011
Rainbow :: git :: sources :: rainbow-0.8.6.tar.bz2 :: announcement
The Bitfrost security specification argues that existing desktop security conventions do not meet the security needs:
- of adventurous kids in 1-1 computing programs,
- of the technical staff who help maintain such initiatives, and
- of the political constituencies which determine where such programs take place.
The most serious inadequacy of such systems is that they force end-users to take unnecessary security risks (for example, giving all programs a user runs access to the network, to auto-start facilities, and to other programs' data files) while simultaneously denying users the opportunity to do things which can be done safely but which were not anticipated by the system administrator (notably, installing new software or modifying the local system.)
Consequently, we wrote Rainbow.
Rainbow is an isolation shell. This means two things:
- shell: Rainbow runs programs on behalf of humans and programs. Rainbow provides those programs with a suitable environment: places in which temporary and persistent data can be stored, environment variables to identify those places, etc.
- isolation: People and programs should use Rainbow when they want to isolate programs from other programs and important system resources. "Isolation" is already a familiar concept to most UNIX programmers: many system daemons already operate using their own unique UID and/or GID, and most have private places in which they store their configuration. Rainbow generalizes and extends this paradigm by providing every program it runs with a unique identity, with private storage, with pre-configured resource usage limits, etc.
At the moment, Rainbow only knows how to provide the same primitive form of filesystem and signal isolation that competent sysadmins provide to users of multi-user Unix shell servers.
However, contributions are welcome, particularly contributions which advance existing plans.
Information about rainbow-0.8.*
- current situation: feature, design, and implementation notes for rainbow-0.8.*
- installation instructions for rainbow-0.8.*
- testing instructions for rainbow-0.8.*
- next steps!
- demo ideas
Other Information
- notes for Activity Developers, for Sugar 0.82 and rainbow-0.7.*
- historical design comparisons, for rainbow-0.6.*, -0.7.*, and -0.8.*
- curiosities
Subpages
(Titles in italics redirect to another page.)