servicerot.blogg.se

Sandboxie osx
Sandboxie osx












  1. Sandboxie osx full#
  2. Sandboxie osx code#
  3. Sandboxie osx mac#

" (ipc-posix-name-regex \"^AudioIO\"))\n"Īccess via IPC shared memory to services with names matching these regexes? TBD Macros for dealing with some form of OS X preferences. " (home-regex (string-append \"/Library/Preferences/\" (regex-quote domain)))))\n" " (home-regex (string-append \"/Library/Preferences/ByHost/\" " (home-literal (string-append \"/Library/Preferences/\" domain \".plist\"))\n" " (allow user-preference-read (preference-domain domain)))\n" " (if (defined? `user-preference-read)\n"

sandboxie osx

" (define (allow-shared-preferences-read domain)\n" Text substitution macros for dealing with paths. " (resolving-regex (string-append var-folders2-re var-folders2-relative-regex)))\n" " (define (var-folders2-regex var-folders2-relative-regex)\n" " (resolving-regex (string-append var-folders-re var-folders-relative-regex)))\n" " (define (var-folders-regex var-folders-relative-regex)\n"

sandboxie osx

" (resolving-literal (string-append home-path home-relative-literal)))\n" " (define (home-literal home-relative-literal)\n" " (resolving-subpath (string-append home-path home-relative-subpath)))\n" " (define (home-subpath home-relative-subpath)\n" " (resolving-regex (string-append \"^\" (regex-quote home-path) home-relative-regex)))\n" " (define (home-regex home-relative-regex)\n" " (define var-folders2-re (string-append var-folders-re \"/+/\"))\n" " (define var-folders-re \"^/private/var/folders/\")\n" These log entries are easily viewed using the OS X "Console" application and filtering on "sandbox". i.e., for any capability not explicitly allowed here, do not allow it to be used.įor any rule that causes an action to be denied, log something in system.log. Used to read hw.ncpu, hw.physicalcpu_max, kern.ostype, and othersĪ subset of the rules originally from /System/Library/Sandbox/Profiles/system.sb which ships with OS X.īy default, we deny. Could be removed, but since root privileges are required to read /dev/dtracehelper this wouldn't be exploitable unless Firefox was run as root or with sudo. Wondering if we need write access to these.Īids debugging the plugin-container using dtrace. autofs_nowait TBD, probably allows non-blocking I/O to autofs paths (used for network mounts and other pseudo mount points.) dev/random, /dev/urandom Used for randomization code. (require-any (subpath "/Library/Filesystems/NetFSPlugins")Īllow these directories and any contained directories and files to be read if the file's permission permits any user to read them.Īllow reading of metadata of these directories. Allow read access to standard system paths. (define appTempDir "/Users//Library/Caches/TemporaryItems/Temp-") (define appDir "/./NightlyDebug.app/Contents/Resources/browser") (define appBinaryPath "/./NightlyDebug.app/Contents/MacOS/plugin-container.app/Contents/MacOS/plugin-container") (define appPath "/./NightlyDebug.app/Contents/MacOS/plugin-container.app") See the next row for examples of what they evaulate to on a Nightly build.Įxample output of the above macros after running a Nightly build. These setup some macros to be used later in the policy.

  • home-path: this is used so the ruleset can generate home-relative rules for ~/Library, ~/.cups (printing) and ~/.CFUserTextEncoding (stores the default text encoding and preferred language for the user.).
  • appTempDir: this is the temp directory for content processes that we create and cleanup in the parent, see bug 1252207 and bug 1237847.
  • macosMinorVersion: this is used to detect OS X 10.9 which rejects the "lsopen" rule.
  • If the value is zero, the sandbox policy isn't used and content processes aren't sandboxed.
  • sandbox-level: this is the value of when it is >=1.
  • I tried with version=2 and sandbox_init failed due to "unsupported version".

    sandboxie osx

    References states only version 1 is supported. Link static const char contentSandboxRules =

    Sandboxie osx mac#

    The Mac policies can be found in SandboxPolicies.h.

    Sandboxie osx code#

    Refer to the source code to learn more about the sandbox rules.

  • The table below is not kept up-to-date.
  • Use of file* in the rules includes all of file-read, file-write, file-read-metadata, and file-write-metadata.
  • An allow rule doesn't bypass OS filesystem permissions that would otherwise block a user's access.
  • sandboxie osx

    + Matches 1 or more non-slash characters. matches a single character that is not a '/'. This is used in some of the regular expressions.

    Sandboxie osx full#

    Refers to the full path to the home directory of the user.














    Sandboxie osx