Rainbow/Current Situation: Difference between revisions

From OLPC
Jump to navigation Jump to search
mNo edit summary
mNo edit summary
Line 7: Line 7:
rainbow-0.8.* isolates programs ([http://en.wikipedia.org/wiki/Process_(computing) processes]) by confining them to accounts with access control [http://linux.die.net/man/7/credentials credentials] which limit the confined programs' ability to commit side-effects like filesystem I/O.
rainbow-0.8.* isolates programs ([http://en.wikipedia.org/wiki/Process_(computing) processes]) by confining them to accounts with access control [http://linux.die.net/man/7/credentials credentials] which limit the confined programs' ability to commit side-effects like filesystem I/O.


rainbow-0.8.* consists of:
In particular, rainbow-0.8.* provides isolation by means of [http://en.wikipedia.org/wiki/File_system_permissions traditional Unix permissions]. It creates the accounts used for this task by means of an [http://www.gnu.org/s/libc/manual/html_node/Name-Service-Switch.html NSS] [http://dev.laptop.org/git/users/mstone/security/tree/rainbow/nss/nss-rainbow.c module] which modifies the appropriate [http://www.gnu.org/s/libc/manual/html_node/Users-and-Groups.html system databases].


# a "UI" layer, containing:
'''Implementation Structure'''
#* the [http://dev.laptop.org/git/users/mstone/security/tree/rainbow/bin/rainbow-run rainbow-run] [http://en.wikipedia.org/wiki/Chain_loading "exec-wrapper"] and
#* some higher-level tools based on that program such as the [http://dev.laptop.org/git/users/mstone/security/tree/rainbow/bin/rainbow-easy rainbow-easy] convenience wrapper.
# an [http://dev.laptop.org/git/users/mstone/security/tree/rainbow/rainbow/inject.py injection library], which contains Rainbow's isolation logic
# an [http://www.gnu.org/s/libc/manual/html_node/Name-Service-Switch.html NSS] [http://dev.laptop.org/git/users/mstone/security/tree/rainbow/nss/nss-rainbow.c module].


These components have the following responsibilities:
rainbow-0.8.* is used via a "UI" like [http://dev.laptop.org/git/users/mstone/security/tree/rainbow/bin/rainbow-run rainbow-run] [http://en.wikipedia.org/wiki/Chain_loading "exec-wrapper"] or some higher-level tool based on that program such as the [http://dev.laptop.org/git/users/mstone/security/tree/rainbow/bin/rainbow-easy rainbow-easy] convenience wrapper.


# The UI is responsible for figuring out what to do and for handing that information to a separate [http://dev.laptop.org/git/users/mstone/security/tree/rainbow/rainbow/inject.py injection library].
# The UI is responsible for figuring out what to do and for handing that information to a separate [http://dev.laptop.org/git/users/mstone/security/tree/rainbow/rainbow/inject.py injection library].
# The injection library is responsible for:
# The injection is responsible for:
#* acting on isolation requests by manipulating persistent state held in a filesystem spool,
#* acting on isolation requests by manipulating persistent state held in a filesystem spool,
#* dropping privilege, and
#* dropping privilege, and
#* handing control to the program being isolated.
#* handing control to the program being isolated.
# Finally, the rainbow NSS module lets other programs read the rainbow spool through the usual POSIX APIs for reading system databases.
# Finally, the rainbow NSS module lets other programs read the rainbow spool through the usual POSIX APIs for reading [http://www.gnu.org/s/libc/manual/html_node/Users-and-Groups.html system databases].


This structure was chosen to so that rainbow can be used from [http://freedesktop.org freedesktop.org] [http://standards.freedesktop.org/desktop-entry-spec/latest/ .desktop] launcher files, from the command-line, and from custom graphical shells like [[Sugar]] with equal ease and so that changes to rainbow can operate without munging important system files like <tt>/etc/passwd</tt> and <tt>/etc/group</tt>.
This structure was chosen to so that rainbow can be used from [http://freedesktop.org freedesktop.org] [http://standards.freedesktop.org/desktop-entry-spec/latest/ .desktop] launcher files, from the command-line, and from custom graphical shells like [[Sugar]] with equal ease and so that changes to rainbow can operate without munging important system files like <tt>/etc/passwd</tt> and <tt>/etc/group</tt>.

Revision as of 21:17, 12 June 2009

Rainbow :: git :: sources :: rainbow-0.8.6.tar.bz2 :: announcement


Design

Rainbow has been implemented according to three designs to date. The present design, implemented in the "rainbow-0.8.*" series, works like this:

rainbow-0.8.* isolates programs (processes) by confining them to accounts with access control credentials which limit the confined programs' ability to commit side-effects like filesystem I/O.

rainbow-0.8.* consists of:

  1. a "UI" layer, containing:
  2. an injection library, which contains Rainbow's isolation logic
  3. an NSS module.

These components have the following responsibilities:

  1. The UI is responsible for figuring out what to do and for handing that information to a separate injection library.
  2. The injection is responsible for:
    • acting on isolation requests by manipulating persistent state held in a filesystem spool,
    • dropping privilege, and
    • handing control to the program being isolated.
  3. Finally, the rainbow NSS module lets other programs read the rainbow spool through the usual POSIX APIs for reading system databases.

This structure was chosen to so that rainbow can be used from freedesktop.org .desktop launcher files, from the command-line, and from custom graphical shells like Sugar with equal ease and so that changes to rainbow can operate without munging important system files like /etc/passwd and /etc/group.

Implementation Notes

  1. State is maintained in a simple filesystem-embedded microformat.
    • Reservations are recorded in foo_pool
    • Maps are named foo_to_bar
    • Key-value pairs are entries are symlinks from key to value.
    • SQLite would have worked just as well.
  2. We provide isolation by generating low-privilege accounts through the NSS module, then by calling things like
    • setrlimit()
    • setgroups()
    • setgid()
    • setuid()
  3. Task-specific "assistant" program like rainbow-xify or rainbow-sugarize provide isolated software with access to task-specific shared resources like:
    • D-Bus sockets,
    • D-Bus cookies,
    • X sockets,
    • X cookies, and
    • temporary filesystems
  4. Mounting filesystems needs to be done as root and is presently done in a new filesystem namespace (see CLONE_NEWNS) in order to reduce resource leakage.

Idioms

See User:Mstone/Tricks for more detail.