summary refs log blame commit diff stats
path: root/README.org
blob: fb7e3ea1652a11a28d5643eaf1c50771063397d8 (plain) (tree)
1
2
3
4
5
6
7
8
9
10
11
12











                                                                           







                                     


























                                                                              
#+HTML_HEAD: <link rel="stylesheet" href="../static/style.css">
#+HTML_HEAD: <link rel="icon" href="../static/pavo.png" type="image/png">
#+EXPORT_FILE_NAME: index
#+TITLE: Pavo

Pavo wraps other programs with /unveil/ & /pledge/.

| Project Home    | [[https://andinus.nand.sh/pavo/][Pavo]]           |
| Source Code     | [[https://tildegit.org/andinus/pavo][Andinus / Pavo]] |
| GitHub (Mirror) | [[https://github.com/andinus/pavo][Pavo - GitHub]]  |

*Tested on*:
- OpenBSD 6.6 amd64

* Working
- Pavo parses the config file
- Directories & commands are unveiled
- Execpromises are added
- Unveil calls are blocked
- Command is executed
* How is it useful?
Let's take =echo= as an example. =echo='s job is to echo what you pass to
it. It should never touch your =$HOME/.ssh=, let's say the next =echo=
update is malicious & it tries to send your =$HOME/.ssh= to the attacker's
servers. It will be able to do that but not if you wrap it around pavo.

=pavo echo= will parse the config & force /unveil/ & /pledge/ on the malicious
=echo=, it won't be able to read your =$HOME/.ssh= directory if it isn't
present in pavo's config. Also uploading the file to the internet will
kill the program immediately.

This assumes that pavo's config file is secure in the first place, if it
isn't then the attacker could simply change it. Also, =echo= is a bad
example for this.

Let's take another example. Let's say you want to run a binary
downloaded from the internet, you kinda trust that person (you don't) &
they say that the binary is a simple ascii game & will just print to
terminal, do nothing else. You could wrap this binary around pavo before
running it & give it limited permissions, like don't unveil anything &
put only =stdio= in execpromises.

If that binary tries to do anything apart from =stdio= the program will be
killed.

- Pavo's config file should be unwriteable at rest
- The config file should only be writeable by the user