jails Security audit of jails (39c3) done by Ilja van Sprundel

Ilja van Sprundel and Michael Smith have done a security audit of the jails sub system of FreeBSD, trying to exploit it and get out of jails.

Over 40 issues were reported to the FreeBSD security system, which van Sprundel praises as very professional and helpful. He also noted that this is not about pointing fingers and laugh, because writing an OS is really hard and painful.

He also developed over 5 different exploits, demonstrated and explained them.

Quite an interesting talk, and how he put it "Exploitation was realistic and way too easy."

As conclusion he's calling for more auditing, don't leak critical kernel pointers, Rust and other measures.

View: https://www.youtube.com/watch?v=obia_Ubu_Rw
 
Thank you for the link.
I won't pretend that I followed everything because it goes way beyond my knowledge, still it's good to have people testing the OS's robustness.
Yep hearing these guys it seems "way too easy" for them to hack FreeBSD.
The conclusion is very "rusty", I am sure one statement won't convince a lot of people here though, especially the "C must die" part.

A total different thing, there is this video where a guy demonstrates that running a service as root in jail can also permit an attacker to escape from the jail. So the idea here is to pointing out things one should not do and how to prevent them to happen by showing few tips.
View: https://www.youtube.com/watch?v=XgO4fHhPDj0
 
Back
Top