Re: sandboxing untrusted code

From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: Robert Haas <robertmhaas(at)gmail(dot)com>
Cc: Jeff Davis <pgsql(at)j-davis(dot)com>, Andres Freund <andres(at)anarazel(dot)de>, PostgreSQL-development <pgsql-hackers(at)postgresql(dot)org>, Noah Misch <noah(at)leadboat(dot)com>, Jacob Champion <jacob(dot)champion(at)enterprisedb(dot)com>
Subject: Re: sandboxing untrusted code
Date: 2026-04-18 19:26:33
Message-ID: 3685390.1776540393@sss.pgh.pa.us
Views: Whole Thread | Raw Message | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

Robert Haas <robertmhaas(at)gmail(dot)com> writes:
> Returning to this topic after some time, I have realized that both of
> these rules are inadequate.
> ... As soon as
> the attacker has *any* influence over what code the victim calls,
> there's a danger of a "confused deputy" attack.

This is true, but I think it's hopeless to imagine that a technical
solution can stop that type of attack altogether. The deception
might happen entirely outside our system; the classical example
being where somebody persuades you to copy-and-paste some shell
code into your terminal window without fully understanding it.

It's certainly likely that there's room for improvement of your
sandboxing ideas, but you shouldn't abandon them because they don't
solve some insoluble problems. If we can make large classes of
attacks infeasible at reasonable cost, we've still accomplished
a lot.

regards, tom lane

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Andres Freund 2026-04-18 19:33:53 Re: sandboxing untrusted code
Previous Message Antonin Houska 2026-04-18 19:23:08 Re: Adding REPACK [concurrently]