Differences between revisions 12 and 13
Revision 12 as of 2009-06-14 20:40:48
Size: 4130
Editor: PaulBoddie
Comment: Added related page links.
Revision 13 as of 2011-03-26 23:19:46
Size: 4219
Editor: PaulBoddie
Comment: Move under the help hierarchy.
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was renamed from How can I run an untrusted Python script safely (i.e. Sandbox)

How can I run an untrusted Python script safely (i.e. Sandbox)

See also: Security, SandboxedPython.

I've noticed that some people mention a Python style sandbox, but nothing concrete. Here's my problem:

I would like to be able to distribue a Python script to be run on computers that may not trust me (I.E. for use as a Folding@Home kind of distributed application.)

However, I would like my Python script to run in a secured sandbox that would not allow that script (by malice or accident) to damage that person's computer.

Also, I would like to be able to call compiled programs to do work (distribute a compiled C++ module to use hard hard hard calculations as a program, then pass the program parameters to do the work, then retrieve the values from standard out, etc); but again, the compiled programs would be "untrustworthy" and would need to be sandboxed somehow.

And thoughts that could help along with this would be great! Thanks.

Some ideas about sandboxing Python

Here are some ideas that you might consider; note that not all of them will be appropriate for some kinds of environments or systems:

  • pypy-c provides sandboxing support, see pypy sandboxing docs

  • Use Jython and try and use the Java platform to lock down the program's privileges. It should be possible to run Jython programs as applets, if implemented appropriately.

  • Have some kind of mechanism that builds a chroot jail for your software, perhaps using chrootbuilder (a Python program which defines chroot jails and emits shell scripts which set them up), makejail (another Python program which makes chroot jails) or Jailkit (a chroot jail utility collection which also uses Python). Note that chroot jails can still be insecure if not set up properly (as described in this article) and it is best to investigate the potential security weaknesses along with the "best practices" used to minimise security risks (as described in this article) and to consider general advice about writing secure programs (such as this chapter on minimising privileges). Something like Plash might be an improvement: a tool based on chroot which "virtualizes the file namespace, and provides per-process/per-sandbox namespaces".

  • Consider using fakechroot and fakeroot with chroot in order to avoid needing root privileges.

  • Operating system virtualisation solutions might prove to be too resource intensive for small-scale sandboxing, but a range of such solutions are available - see Wikipedia's "Comparison of virtual machines" for an overview.

Unfortunately, CPython's restricted execution capabilities (rexec, Bastion) were deprecated after it was discovered that improved introspection capabilities had rendered their mechanisms ineffective. By using an alternative runtime (ie. Jython) or operating system features (eg. chroot jails), you may actually be utilising a better solution, however. -- PaulBoddie

In addition to the above, added anonymously, you might want to inspect jailtools to see whether it provides some useful ideas for chroot jail construction. Note that I do not make any guarantees about security for jailtools. -- PaulBoddie

Asking for Help/How can I run an untrusted Python script safely (i.e. Sandbox) (last edited 2017-06-06 20:37:10 by DmitryS)

Unable to edit the page? See the FrontPage for instructions.