Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Back in 1999 we had MOSDEF and CORE IMPACT (...)

I'm not familiar with these. Googling "MOSDEF attack" suggests Massive Attack songs and "CORE IMPACT" various products by Core Security, I presume you're referring to neither? :-)

> Only executing native code is no defense at all. You're not even stopping attackers from the '90s like that.

> ROP is only a hardship until exploit code can find a way to allocate executable memory or hook the program's own dynamic execution (...)

Only executing native code loaded at deployment time, i.e. presumably from a trusted source. What I meant by "immutable page tables" is that after loading the unikernel image the set of executable pages is fixed, and all of those are read only. This is not something current unikernels do, but that's more due to lack of development time rather than any inherent implementation complexity.

If there is no way for the exploit code to ask the hypervisor for new executable pages or overwrite existing ones then the amount of damage it can do and its ability to persist in the running system is greatly reduced.

> Really, what you're describing here is the browser security model. When staffed by the largest, best security teams in the world, the browser security model almost works.

It's similar but not the same. The browser security model breaks down in a large part due to exposing way too many APIs, most of which are too complex to sensibly audit. Linux system calls have a similar problem, which is why you have to hand-craft things like seccomp profiles to match your particular application.

Unikernels (as used to implement network services) lend themselves extremely well to running on top of a well defined API / sandbox boundary, designed with security in mind. Again, we're not there yet, but the steps we need to explore in this direction are fairly clear.






Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: