Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They are owned by the same user so they probably have access to everything the other processes have. And they can probably just read the access token from the environment which is accessible through the /proc filesystem.


Neither of these things are possible in a sandboxed browser: the syscalls are blocked, and the filesystem isn't (fully) accessible.


What is the mechanism for this kind of sandboxing?


Namespaces let you create isolated views of the file system, isolated views of processes (ex: if you are in a new pid namespace and run 'ps' you only see yourself), users, network interfaces, etc.

I'm not sure what Firefox does, I believe they use the Chromium sandbox, and I'm way out of date on that. It used to do some filesystem setup like hardened chroots, but I would assume that's been supplanted by fs namespacing.


Looks cool, I clearly haven’t kept up with this.


Google [seccomp bpf].




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: