User Details
- User Since
- Dec 14 2014, 3:26 PM (550 w, 1 d)
Apr 22 2025
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Sounds pretty much as a very deep redefinition of the jail contract to me.
Apart from jamies comment, How is this different from any other daemon running as root in a jail? If you can take over any externally reachable service in a jail, it is over. You need to delete the jail and start fresh (with a fixed daemon).
Apr 21 2025
...
No, the host is gone as well, since the attacker has control over network connectivity.
You go to the keyboard of the host, delete the jail, and the attacker is gone.
Repeating that someone might have his mind set on running BIRD in a swiss-cheese-jail is far from providing arguments on what real security benefit would this provide compared to running it in a plain system (or in a chrooted tree).
Apr 19 2025
I've been running routing daemons in VNET jails with chroot=/ myself for more than two decades, so have nothing against chroot=/ jails per se. But this is pushing in the opposite direction, having routing daemons running in pseudo-jails with very weak isolation.
This change depends on https://reviews.freebsd.org/D49843, which is still contentious and unresolved.
Apr 16 2025
Will other routing daemons, which manage not only routing tables, but also system interfaces and their addresses, work 100% happily in this new ALLOW_ROUTING jail, or is this hack BIRD specific? What if BIRD folks one day decide to start adding direct interface management capabilities there, should we then follow up with punching more holes and start adding ALLOW_IFADDR, ALLOW_IFUPDN etc. etc. And if so, where's the boundary, where do we stop?
In which application scenarios could allowing jailed processes to take command of system's routing tables be considered useful / desirable?
Feb 27 2025
By design, moving an eiface ifnet from one vnet to another always implied that its netgraph node will remain attached in the parent vnet. This is not an omission or a mistake, but a well established mode of operation on which certain applications heavily depend on, and which this patch proposes to change, for reasons not clearly stated.
May 23 2024
May 22 2024
May 17 2024
May 14 2024
May 7 2024
May 6 2024
Sep 23 2023
Jun 15 2023
May 27 2023
May 4 2022
May 3 2022
Mar 30 2022
This change builds on top if_index globalization (91f44749c6feb50f39af8805dd803e860f0418f1) which I strongly objected to, and which glebius agreed to back out as outlined in https://github.com/glebius/FreeBSD/commits/backout-ifindex, but that never happened. Hence, pls. don't proceed with this until if_index is reverted back to per-VNET state.