-
Notifications
You must be signed in to change notification settings - Fork 98
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] Sandbox PKCS#11 module #294
Comments
Part of that is already possible with the |
Interesting... Maybe adding this to the documentation would be a good idea to create awareness of this feature. Anyway, blocking I/O is still a problem with applications like Firefox, that are hanging if a module is not responding. |
Having said that, it would be nice if p11-kit transparently does sandboxing. The current configuration syntax is a bit too limited for that; maybe adding a new option to refer external policy settings would be nice (e.g., |
Likely unrelated, but it feels like adding the |
PKCS#11 modules could be sandboxed (made abortable at the same time) with https://github.com/google/sandboxed-api, for example. This would prevent a bogus PKCS#11 module from corrupting the process. Also, this would allow keeping the process responsive if the module has some I/O problem, for example.
The text was updated successfully, but these errors were encountered: