mirror of
https://github.com/hickory-dns/hickory-dns.git
synced 2026-04-24 18:55:55 +03:00
[GH-ISSUE #12] Feature request: Add support for sandboxing #308
Labels
No labels
blocked
breaking-change
bug
bug:critical
bug:tests
cleanup
compliance
compliance
compliance
crate:all
crate:client
crate:native-tls
crate:proto
crate:recursor
crate:resolver
crate:resolver
crate:rustls
crate:server
crate:util
dependencies
docs
duplicate
easy
easy
enhance
enhance
enhance
feature:dns-over-https
feature:dns-over-quic
feature:dns-over-tls
feature:dnsssec
feature:global_lb
feature:mdns
feature:tsig
features:edns
has workaround
ops
perf
platform:WASM
platform:android
platform:fuchsia
platform:linux
platform:macos
platform:windows
pull-request
question
test
tools
tools
trust
unclear
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hickory-dns#308
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @pwrdwnsys on GitHub (Jun 2, 2016).
Original GitHub issue: https://github.com/hickory-dns/hickory-dns/issues/12
It would be useful to have support for sandboxing trust-dns, in particular decoding of requests.
rusty-sandbox offers an abstraction layer over the sandboxing mechanisms provided by several operating systems, and could be incorporated as an optional compile-time feature.
@bluejekyll commented on GitHub (Jun 2, 2016):
Looks like Linux support is lacking. I don't have a good way to test the other OSes right now. If I incorporate this is it something you could test? I really like the idea.
@pwrdwnsys commented on GitHub (Jun 2, 2016):
Yes, happy to do some testing. I can test against OS X and FreeBSD, and can also test against OpenBSD when rusty-sandbox's pledge support is completed.
@phillipCouto commented on GitHub (Aug 28, 2016):
On linux wouldn't the tools like selinux, systemd, and apparmor provide very similar features without the application being coded with sandbox logic?
Also there is no support for windows in rust-sandbox or the mentioned gaol library either. For completeness isn't this something to consider as well?
@bluejekyll commented on GitHub (Aug 28, 2016):
I have done zero research on this. selinux, apparmor, even docker/lxc, would be fine methods of sandboxing the process.