ietf-wg-bpf / ebpf-docs

eBPF Standard Documentation
42 stars 5 forks source link

ISA: missing Security Considerations section #121

Closed dthaler closed 5 months ago

dthaler commented 5 months ago

Found by ID-nits

dthaler commented 5 months ago

David Vernet wrote:

[Gemini] picked out stuff from other text around the web about security within the kernel, but it gave me some ideas. I suspect it might suffice to highlight things like:

  • The Instruction Set Architecture may allow "bad programs" to do "bad things" with accessible memory regions or use of compute resources (infinite loops or extend expensive computation), and is not fundamentally different from any other Instruction Set Architecture in this regard.

Not sure if any of that nonsense helps, but just in case ... =)

It most certainly does help. As your paragraphs say, I think it's probably reasonable to just enumerate possible issues that could result from running BPF programs, and then explain that verification, safety, etc, are out of scope and the responsibility of other layers such as the verifier. In other words, I expect this will be an "educational disclaimer" paragraph.

dthaler commented 5 months ago

Strawman text also posted to the list for review: https://mailarchive.ietf.org/arch/msg/bpf/ep1ry_n82ORKtRSerr45CwcM570/

dthaler commented 5 months ago

Fixed in draft-02