Skip to content

Commit

Permalink
Merge pull request #87 from gkwhite/master
Browse files Browse the repository at this point in the history
Add BSDCan 2020 videos by Stone, Beh, Long and Shirk #79.
  • Loading branch information
gkwhite authored Oct 18, 2020
2 parents ceaaa49 + e114e9d commit 93d0713
Show file tree
Hide file tree
Showing 4 changed files with 44 additions and 0 deletions.
11 changes: 11 additions & 0 deletions content/2020/BSDcan/beh-iocage_FreeBSD_Jail_Management_Tool.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
---
layout: video
title: "The iocage FreeBSD Jail management tool, an overview, its Plugins, and Plugin development"
date: 2020-06-05
author: Conor Beh
email: [email protected]
youtube: HaYArIBQNao
---
The FreeBSD Jail isolation mechanism celebrates its 20th anniversary in 2020 and has provided administrators a convenient, lightweight virtualization solution for virtual hosting, package building, and countless administrative support tasks. Of the many Jail management tools available, iocage provides not only management features but also includes a sophisticated|comprehensive Plugins system that provides collections of prepackaged software for a number of roles ranging from personal cloud services, to source control systems, to media servers.

This talk will provide an overview of the iocage Jail management system, a survey of its plugins, and a demonstration of how to create a new iocage plugin.
10 changes: 10 additions & 0 deletions content/2020/BSDcan/long-Thunderbolt_on_FreeBSD.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
---
layout: video
title: "Thunderbolt on FreeBSD"
date: 2020-06-05
author: Scott Long
youtube: VbAJf2PBE-M
---
Thunderbolt3 combines external USB3, PCIe, and DisplayPort peripherals into a converged interface. While the original intent was that OS-specific drivers would not be needed for peripherals to function, the reality is that a driver is needed to interact with the security features of the subsystem, flash firmware, and manage bandwidth and error handling. Additionally, the OS must provide robust PCI hotplug support in order to handle device arrival and departure.

This talk will present the architecture of the FreeBSD thunderbolt driver, the challenges faced with hot-plug, and the roadmap for future support, including USB4.
10 changes: 10 additions & 0 deletions content/2020/BSDcan/shirk-BSD_Honeypots.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
---
layout: video
title: "BSD Honeypots - Of course it runs on BSD"
date: 2020-06-06
author: Michael Shirk
youtube: qmq1GTJuxOw
---
In the past, there was some interest in the setting up of honeypots on BSD operating systems with tools like honeyd. Honeypots attempt to capture malicious code, network worms and attackers by emulating vulnerable services using a variety of methods. An opportunity came up for me to try to capture some malicious code using a simple setup with FreeBSD and jails. The setup was simple and easy to replicate as a way to perform security research on current attacks across the Internet and correlate with other threat sources for analysis.

The goal for this talk will be to walk through a brief introduction of honeypots, followed by a background of honeypots on the BSD operating systems such as honeyd. I will walk through the simple steps I used to setup the necessary services and network configs with a FreeBSD jail and the additional jails I utilized for monitoring the honeypot with a Network Security tool such as Zeek, Suricata or Snort. I will also cover some other ways to setup honeypots on all of the BSD operating systems.
13 changes: 13 additions & 0 deletions content/2020/BSDcan/stone-Oblivious_Sandboxing_Capsicum_eBPF.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
---
layout: video
title: "Oblivious Sandboxing with Capsicum and EBPF"
date: 2020-06-05
author: Ryan Stone
email: [email protected]
youtube: TGA4wbjbqXc
---
The Capsicum sandboxing framework currently has the limitation that programs must have their source modified to make them amenable to sandboxing. A long-term goal of the project is oblivious sandboxing: running programs with no knowledge of Capsicum inside of a sandbox with the full protections offered by Capsicum. This would allow the sandboxing of third-party applications that are unlikely to accept large patches for Capsicum support.

In this talk, we build upon previous work in this area to demonstrate how eBPF bytecode programs can be used to realize the promise of oblivious Capsicum sandboxing. By adding an eBPF entry point in the syscall path, it is possible to write eBPF programs that dynamically transform disallowed operations performed by the sandboxed application into operations allowed by Capsicum.

We will begin with an overview of eBPF and its programming environment. We will then show how an eBPF program can intercept a syscall at runtime and change its behaviour. Using this ability, we will demonstrate eBPF programs that force existing applications to conform to the restrictions placed by Capsicum while maintaining their behaviour. Using real-world programs like clang and tar as examples, we will show the eBPF programs and the extensions to the eBPF runtime required to safely sandbox these programs without requiring source modifications.

0 comments on commit 93d0713

Please sign in to comment.