Главная
Study mode:
on
1
Intro
2
Who am I
3
Disclaimer
4
What is a Sandbox
5
Why use a Sandbox
6
Application expectations
7
Setting up a sandbox
8
Example application
9
namespaces
10
usernamespace
11
mappings
12
running as root
13
making a new file system
14
making a new mount point
15
making a temporary file system
16
proc file system
17
new proc namespace
18
pid namespace
19
Create new namespace
20
Clone newnet
21
Build the application
22
Protect the system
23
Seccomp
24
Seccomp Program
25
libsec comp
26
argument checks
27
compare strings
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the intricacies of sandboxing Linux applications in this comprehensive conference talk from NDC Security 2022. Delve into the methods of isolating applications from the rest of the Linux system, safely evaluating downloaded code, and understanding how Docker sets up new filesystems. Learn to create your own sandbox using available Linux APIs, gaining insights into how major projects like Chromium and Docker utilize these techniques for system protection and problem-solving. Cover topics including namespaces, user and PID namespaces, file system manipulation, and Seccomp for system protection. Gain practical knowledge through an example application, exploring concepts such as running as root, creating new mount points, and implementing temporary file systems.

Sandboxing a Linux Application

NDC Conferences
Add to list