!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

340 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.122 Servers

Load older messages


SenderMessageTime
1 Apr 2025
@jade_:matrix.orgjade_yes23:21:27
@artemist:mildlyfunctional.gayartemistSeems like the easiest way to figure that out will be to try it, i'll do that23:25:36
@rhelmot:matrix.orgrhelmot my guess is that software which isn't explicitly checking for "am I communicating with a jailed user" will think you are the real actual root 23:27:25
@artemist:mildlyfunctional.gayartemistthe main page for LOCAL_PEERCRED doesn't have jid, just "effective user id"23:27:51
@artemist:mildlyfunctional.gayartemist https://man.freebsd.org/cgi/man.cgi?query=unix&apropos=0&sektion=0&manpath=FreeBSD+13.1-RELEASE+and+Ports&arch=default&format=html 23:27:51
@jade_:matrix.orgjade_of course the other interaction with this that might be hilarious is if freebsd has abstract domain unix sockets, which I think it does because they had to copy linux's bad features for the linux abi thing23:28:44
@artemist:mildlyfunctional.gayartemistFreeBSD has a linux compatibility layer so I wouldn't be surprised23:30:11
@artemist:mildlyfunctional.gayartemistlike, it's sufficiently compatible to run commercial games and software23:30:52
@jade_:matrix.orgjade_https://lists.freebsd.org/archives/freebsd-hackers/2021-December/000636.html hm23:31:10
@jade_:matrix.orgjade_maybe they did not!23:31:13
@jade_:matrix.orgjade_at least it is good that they are proposing "having a security model" for this feature which is a walking CVE23:31:33
@artemist:mildlyfunctional.gayartemist... who the hell thought this was a good idea23:32:58
@jade_:matrix.orgjade_I DONT KNOW BUT I DO KNOW HOW MANY CVES THIS FUCKIN THING HAS CAUSED23:33:11
@jade_:matrix.orgjade_ did you know they are isolated by network namespace on linux??? infinite CVEs in container runtimes... 23:33:30
@artemist:mildlyfunctional.gayartemistif you're forced to have them then network namespace feels like the least bad place to isolate them, but oh god23:34:05
@jade_:matrix.orgjade_no it's not23:34:13
@artemist:mildlyfunctional.gayartemistoh, mount namespace?23:34:35
@jade_:matrix.orgjade_host netns allowing containers to send each other fds is how you get CVE-2024-27297 23:34:45
@jade_:matrix.orgjade_among also docker ones23:34:51
@artemist:mildlyfunctional.gayartemistnetwork namespace is where i would expect them to go23:35:03
@jade_:matrix.orgjade_CVE-2020-15257 lol23:35:14
@jade_:matrix.orgjade_but unix sockets exist as a fd passing primitive and secondarily as a network feature, in my view :)23:35:42
@jade_:matrix.orgjade_ the fact that you have to shove containers into a netns with NAT if you don't want them sending each other fds is a hilarious linux moment 23:36:14
@artemist:mildlyfunctional.gayartemistYeah, that's not the worst interpretation. It makes me think of how systemd is a database for file descriptors23:36:49
@artemist:mildlyfunctional.gayartemistsending file descriptors between mount namespaces at all feels sus23:37:15
@jade_:matrix.orgjade_it combines somewhat poorly with the userspace nat implementations being all kind of annoying. pasta, slirp4netns, etc23:37:17
@jade_:matrix.orgjade_it's ... well. i can see the use case for it in container setup, but it is pretty sketchy23:37:42
@jade_:matrix.orgjade_(and i think that it really should only be allowed on inherited fds)23:38:06
@artemist:mildlyfunctional.gayartemistI wonder how much would break if I patched linux to disallow abstract sockets23:39:28
@jade_:matrix.orgjade_they can be disabled via apparmor and other LSMs23:40:22

Show newer messages


Back to Room ListRoom Version: 10