mirror of
https://gitlab.com/chrony/chrony.git
synced 2025-12-07 15:05:07 -05:00
sys_linux: use privops helper when running with seccomp filter
Enable the PRV_Name2IPAddress() function with seccomp support and start the helper process before loading the seccomp filter (but after dropping root privileges). This will move the getaddrinfo() call outside the seccomp filter and should make it more reliable as the list of required system calls won't depend on what glibc NSS modules are used on the system.
This commit is contained in:
13
doc/faq.adoc
13
doc/faq.adoc
@@ -139,12 +139,13 @@ a very limited range of privileged system calls on behalf of the parent.
|
||||
Also, if +chronyd+ is compiled with support for the Linux secure computing
|
||||
(seccomp) facility, you can enable a system call filter with the +-F+ option.
|
||||
It will significantly reduce the kernel attack surface and possibly prevent
|
||||
kernel exploits from the +chronyd+ process if compromised. The filter
|
||||
shouldn't be enabled without testing that it allows all system calls needed
|
||||
with the specific configuration and libraries that +chronyd+ is using (e.g.
|
||||
libc and its NSS configuration). If +chronyd+ is getting killed, some system
|
||||
call is missing and the filter has to be disabled until it's patched to allow
|
||||
that call.
|
||||
kernel exploits from the +chronyd+ process if it's compromised. It's
|
||||
recommended to enable the filter only when it's known to work on the version of
|
||||
the system where +chrony+ is installed as the filter needs to allow also system
|
||||
calls made from libraries that +chronyd+ is using (e.g. libc) and different
|
||||
versions or implementations of the libraries may make different system calls.
|
||||
If the filter is missing some system call, +chronyd+ could be killed even in
|
||||
normal operation.
|
||||
|
||||
=== How can I improve the accuracy of the system clock with NTP sources?
|
||||
|
||||
|
||||
Reference in New Issue
Block a user