You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As @adrelanos suggested on the Whonix forum, it would be desirable to implement a Linux Namespaces wrapper for Horklump, so that even if a malicious tracee escapes from the ptrace sandbox, it still won't be able to bypass the proxy.
(This is not a replacement for ptrace, just a defense-in-depth tactic.)
The text was updated successfully, but these errors were encountered:
It sounds like @handpickencounter has some code sitting around for this purpose?
They also said:
suggestion - simply unshare the network namepsace (no interfaces, no listening ports) so no need to block any packets. utilize tor's ability to create unix domain sockets for socks5 listeners.
The way I usually do it is with a more comprehensive setup for bwrap (bubblewrap) and unshare more things, apply seccomp, private writable /home dir etc
As @adrelanos suggested on the Whonix forum, it would be desirable to implement a Linux Namespaces wrapper for Horklump, so that even if a malicious tracee escapes from the ptrace sandbox, it still won't be able to bypass the proxy.
(This is not a replacement for ptrace, just a defense-in-depth tactic.)
The text was updated successfully, but these errors were encountered: