1 |
On Thu, 15 May 2014 14:44:58 -0400 |
2 |
Mike Gilbert <floppym@g.o> wrote: |
3 |
> On Thu, May 15, 2014 at 1:17 PM, Ciaran McCreesh |
4 |
> <ciaran.mccreesh@××××××××××.com> wrote: |
5 |
> > On Thu, 15 May 2014 17:15:32 +0000 |
6 |
> > hasufell <hasufell@g.o> wrote: |
7 |
> >> Ciaran McCreesh: |
8 |
> >> > Sandboxing isn't about security. |
9 |
> >> > |
10 |
> >> |
11 |
> >> Sure it is. |
12 |
> > |
13 |
> > Then where do the bug reports for all the "security violations" |
14 |
> > possible with sandbox go? |
15 |
> > |
16 |
> |
17 |
> There is a big difference between the sandbox utility |
18 |
> (sys-apps/sandbox) and the network-sandbox/ipc-sandbox features. The |
19 |
> former uses an LD_PRELOAD hack to intercept libc functions, and does |
20 |
> not provide any security benefit. The latter options create separate |
21 |
> namespaces in the kernel, which is probably a lot more secure. |
22 |
|
23 |
"Secure" against what? Malicious ebuilds? Malicious packages? |
24 |
|
25 |
-- |
26 |
Ciaran McCreesh |