Crates.io | syd |
lib.rs | syd |
version | |
source | src |
created_at | 2023-10-03 13:43:19.608776 |
updated_at | 2024-12-01 18:25:46.092325 |
description | rock-solid application kernel |
homepage | https://man.exherbolinux.org |
repository | https://gitlab.exherbo.org/sydbox/sydbox.git |
max_upload_size | |
id | 991049 |
Cargo.toml error: | TOML parse error at line 29, column 1 | 29 | autolib = false | ^^^^^^^ unknown field `autolib`, expected one of `name`, `version`, `edition`, `authors`, `description`, `readme`, `license`, `repository`, `homepage`, `documentation`, `build`, `resolver`, `links`, `default-run`, `default_dash_run`, `rust-version`, `rust_dash_version`, `rust_version`, `license-file`, `license_dash_file`, `license_file`, `licenseFile`, `license_capital_file`, `forced-target`, `forced_dash_target`, `autobins`, `autotests`, `autoexamples`, `autobenches`, `publish`, `metadata`, `keywords`, `categories`, `exclude`, `include` |
size | 0 |
Syd is a rock-solid application kernel to sandbox applications on Linux>=5.19. Syd is similar to Bubblewrap, Firejail, GVisor, and minijail. As an application kernel it implements a subset of the Linux kernel interface in user space, intercepting system calls to provide strong isolation without the overhead of full virtualization. Syd is secure by default, and intends to provide a simple interface over various intricate Linux sandboxing mechanisms such as LandLock, Namespaces, Ptrace, and Seccomp-{BPF,Notify}, most of which have a reputation of being brittle and difficult to use. You may run Syd as a regular user, with no extra privileges, and you can even set Syd as your login shell. Syd adheres to the UNIX philosophy and intends to do one thing and do it well with least privilege: Neither SETUID is required like Firejail, nor privileged kernel context is required like EBPF-based alternatives such as Falco or this. Syd is based mostly on and shares its Threat Model with Seccomp. Syd does not suffer from TOCTTOU issues like GSWTK and Systrace: As an application kernel, it executes system calls on behalf of the sandboxed process rather than continuing them in the sandbox process. LandLock, up to ABI version 6, is supported for additional hardening. Use of Ptrace is minimal and optional with a negligible overhead. Use of unprivileged user namespaces is optional and off by default. A brief overview of Syd's capabilities are as follows:
Read the fine manuals of syd,
libsyd,
gosyd,
plsyd,
pysyd,
rbsyd,
syd.el and watch the asciicasts Memory
Sandboxing, PID
Sandboxing, Network
Sandboxing, and Sandboxing Emacs with
syd. Join the CTF event at
https://ctftime.org/event/2178 and try to read the file /etc/CTF
¹ on
syd.chesswob.org with ssh user/pass: syd.²
syd AT chesswob DOT org
. Encrypt with the key above.Maintained by Ali Polatel. Up-to-date sources can be found at https://gitlab.exherbo.org/sydbox/sydbox.git and bugs/patches can be submitted to https://gitlab.exherbo.org/groups/sydbox/-/issues. Follow toots with the #sydbox hashtag and discuss in #sydbox on Libera Chat.
¹: SHA256(/etc/CTF
)=f1af8d3946546f9d3b1af4fe15f0209b2298166208d51a481cf51ac8c5f4b294
²: Start by reading the CTF sandbox profile.