Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Neither of these things are possible in a sandboxed browser: the syscalls are blocked, and the filesystem isn't (fully) accessible.


What is the mechanism for this kind of sandboxing?


Namespaces let you create isolated views of the file system, isolated views of processes (ex: if you are in a new pid namespace and run 'ps' you only see yourself), users, network interfaces, etc.

I'm not sure what Firefox does, I believe they use the Chromium sandbox, and I'm way out of date on that. It used to do some filesystem setup like hardened chroots, but I would assume that's been supplanted by fs namespacing.


Looks cool, I clearly haven’t kept up with this.


Google [seccomp bpf].




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: