User:ScotXW/Sandboxes on Linux

From Wikipedia, the free encyclopedia

Sandboxes on Linux looks at the different mechanisms there are to implement sandbox on Linux = Linux kernel-based family of operating systems. With regard to the article sandbox being a pile of crap: July 2014 it is hard to document these software project, since we cannot just refer to the article to explain the underlying mechanisms and their merits. I doubt Wikipedia will ever attract good writers... its not the money, its the idiots being around here, and throwing money at it, will not help. Best follow Helmuth von Moltke the Elder advise and send them far far away...

  1. I think User:ScotXW/Virtualization introduced sandboxes and containers. If there is a difference between a sandbox and a container, I guess sandbox = for 1 application, container = for n applications. Sandbox was originally only for security, but nothing speaks against applying resource management to it.
  • Issues of iX, c't, de:Linux-Magazin in Years 2014/2015 contain a couple of comprehensive articles on the available Linux solutions even with their history!

Comparison

More information OS, Techinque ...
Sandboxing Chromium (based on Jonathan Anderson at FOSDEM2014)
OSTechinqueLoCFSIPCNETS≠S'Priv
Windows DAC ACLs22,350NoNoYesWindows ACLs and SIDs
Linux chroot600YesNoNoYesNoSUID-root sandbox helper
SELinux200YesYesNoNoType Enforcement sandbox domain
seccomp11,300YesYesYesYesseccomp and userspace syscall wrapper
kdbus & cgroups??????also facilitates resource management; systemd-nspawn(1)
OS X Sandbox560YesYesYesYesSeatbelt? Path-based MAC sandbox
FreeBSD Capsicum100YesYesYesYesYesCapsicum sandboxing using cap_enter
Close

References

Related Articles

Wikiwand AI