Jump to content

User:ScotXW/Sandboxes on Linux

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by ScotXW (talk | contribs) at 20:39, 13 July 2014 (Comparison). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Sandboxes on Linux looks at the different mechanisms there are to implement sandbox on Linux = Linux kernel-based family of operating systems. With regard to the article sandbox being a pile of crap: July 2014 it is hard to document these software project, since we cannot just refer to the article to explain the underlying mechanisms and their merits. I doubt Wikipedia will ever attract good writers... its not the money, its the idiots being around here, and throwing money at it, will not help. Best follow Helmuth von Moltke the Elder advise and send them far far away...

  1. I think User:ScotXW/Virtualization introduced sandboxes and containers. If there is a difference between a sandbox and a container, I guess sandbox = for 1 application, container = for n applications. Sandbox was originally only for security, but nothing speaks against applying resource management to it.


Comparison

Sandboxing Chromium (based on Jonathan Anderson at FOSDEM2014)
OS Techinque LoC FS IPC NET S≠S' Priv
Windows DAC ACLs 22,350 No No Yes Windows ACLs and SIDs
Linux chroot 22,350 Yes No No Yes No SUID-root sandbox helper
SELinux 22,350 Yes Yes No No Type Enforcement sandbox domain
seccomp 22,350 Yes Yes Yes Yes seccomp and userspace syscall wrapper
OS X Sandbox 260 Yes Yes Yes Yes Seatbelt? Path-based MAC sandbox
FreeBSD Capsicum 100 Yes Yes Yes Yes Yes Capsicum sandboxing using cap_enter


  1. ^ "Understanding the Access Control Model for Tizen Application Sandboxing". Archived from the original (PDF) on 2012-09-12.
  2. ^ "Capsicum: practical capabilities for UNIX" (PDF). 2010.
  3. ^ "Capsicum: practical capabilities for UNIX". LWN.net. 2012-02-22.
  4. ^ "Capsicum in the Linux kernel". LWN.net. 2014-07-01.