#Exherbo

2025-11-16

#sydbox 3.45.0 is released! This update strengthens root mount security by applying strict namespace protections and introducing configurable ramfs mounting. New flags enforce more robust handling of symbolic links and file creation. Various bug fixes, including improved PTY sandboxing and stat(2) handling, solidify sandbox stability and security. Notable changes include new environment variables and expanded restrictions for unsafe capabilities: sydbox.exherbo.org #exherbo #linux #security

2025-11-10

Fellow #Exherbo developer Johannes Nixdorf, aka mixi, fixed a race in #Linux kernel seccomp(2). The bug caused #golang programs to fail with EINTR under #sydbox. Kees Cook has merged the fix recently and it has been ported to all stable trees. One more item checked out to unmask syd-3 on #Exherbo, yey!: gitlab.exherbo.org/exherbo/arb

2025-11-08

Before you write your own #landlock wrapper, check this one out: syd-lock, a simple #cli that supports up to #landlock abi 7 with a simple interface: man.exherbo.org/syd-lock.1.html #exherbo #linux #security

2025-11-08

Imagine how many proc(5) parsing libraries you will break if you set your process name to "lol ) R 42" which #Linux will provide as is without escaping in the proc(5) files. #sydbox' process name modification restriction guards against this: man.exherbo.org/syd.7.html#Pro #exherbo #security

2025-11-05

#sydbox 3.42.0 is released! Syd is a rock solid application #kernel to #sandbox applications on #Linux >= 5.19 and requires no extra privileges! Grab it while it's hot! is.gd/syd_3_42_0 #exherbo #security

2025-11-05

Symlinks strike again! This time with 3 #container breakouts in #runc. Other runtimes including #youki and #crun are also affected. #sydbox' syd-oci is also affected which is based on #youki. Expect updates soon: openwall.com/lists/oss-securit #exherbo #linux #security #podman

2025-11-01

Did you know syd-ls(1) is the safest and most efficient ls(1) in human history? man.exherbo.org/syd-ls.1.html #exherbo #sydbox #linux #security

2025-10-29

Here is an interesting attempt to implement system call cookies for #OpenBSD marc.info/?l=openbsd-tech&m=17 #sydbox had this feature for a while and we've been extending it with new system calls ever since: man.exherbo.org/syd.7.html#Sys #exherbo #linux #security

2025-10-25

#sydbox 3.41.1 is released. This release comes with some fixes for networking syscalls and wordexp. I addition, we release the initial version of syd-tui, which is a terminal user interface for syd written in #async #rustlang with @ratatui_rs and #tokio! See the asciicast for a primer: asciinema.org/a/751235 #exherbo #linux #security

2025-10-19

I ran the #ELF #parser of #sydbox over 60k #Linux #malware samples from #Virusshare and 40k orcs which are malformed elves generated by the Melkor ELF #Fuzzer and got no crashes. The parser is written in #rustlang. It's free from unsafe code and arithmetic side effects. Syd parses ELF at exec(3) and mmap(2) boundary to perform various restrictions for binaries such as PIE and non-executable stack. #exherbo #security

2025-10-19

Read this section of the syd(7) manual page for more info on the new securebits handling of #sydbox: man.exherbo.org/syd.7.html#Sec #exherbo #linux #security

2025-10-14

Never trust other people's benchmarks: For #sydbox benchmarks are run in CI with different profiles over #git compilation. #gvisor is also used with ptrace and systrap backends to have a solid ground to compare against. Unlike the unrealistic getpid benchmark which gvisor devs use in their blogpost to justify systrap is noticably faster, our benchmark claim the opposite. This on its own proves nothing but it's enough reason to be skeptic about benchmarks. #exherbo #linux builds.sr.ht/~alip/job/1587917

2025-10-11
2025-10-04

News from #sydbox #git: We have started testing using LTP in CI which uncovered many bugs, we have fixed all of them and LTP tests currently pass. Huge thanks to the LTP project! Stay tuned for next release! #exherbo #linux #security linux-test-project.readthedocs

2025-09-29

#sydbox 3.39.0 is released: isolated procfs (subset=pid+hidepid=4); syscall arg-cookies for net syscalls; keyrings replace raw keys for Crypt sandboxing; force RESOLVE_NO_XDEV with trace/force_no_xdev; new lock mode lock:read: is.gd/syd_3_39_0 #exherbo #linux #security

2025-09-15

sydbox-3.38.5 is out! Final release before #BalCCon2k25! Everyone is invited to my talk on Advanced sandboxing :) Slides are here if you want to take a look before: gitlab.exherbo.org/sydbox/sydb #exherbo #linux #security

2025-09-03

#sydbox 3.38.0 comes with hardened proc_pid_status(5) which zeroes out fields such as TracerPid and Seccomp. This is intended to help with #malware analysis, as these fields are commonly used by malware to evade detection, see this for more info: man.exherbo.org/syd.7.html#Har #exherbo #linux #security

2025-09-02

#sydbox 3.38.0 is released! Refined device restrictions, hardened proc & seccomp filters, #OpenBSD pledge(2) style category sets, #Landlock ABI 7 support, and safer handling of memfd & personality flags. See is.gd/syd_3_38_0 I'll be giving a talk on advanced sandboxing at #BalCCon2k25! Everyone is invited! #exherbo #linux #security

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst