Announcement

Collapse
No announcement yet.

Microsoft Security Researcher Proposes Unprivileged Chroot For Linux

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Microsoft Security Researcher Proposes Unprivileged Chroot For Linux

    Phoronix: Microsoft Security Researcher Proposes Unprivileged Chroot For Linux

    Security researcher and Microsoft engineer Mickaël Salaün is proposing unprivileged chroot support for the Linux kernel...

    https://www.phoronix.com/scan.php?pa...vileged-Chroot

  • #2
    No, Jim. This is not a sign of Windows shifting to use the Linux kernel.

    At least not yet

    Comment


    • #3
      How would this be different from proot?
      https://proot-me.github.io/

      Comment


      • #4
        Every thread with "Microsoft" on it:

        *looks at comments*

        ​​*EEE-related comment*

        Comment


        • #5
          Originally posted by macemoneta View Post
          How would this be different from proot?
          Microsoft's prootEEE has a much nicer ring to it.

          Comment


          • #6
            Originally posted by macemoneta View Post
            How would this be different from proot?
            https://proot-me.github.io/
            Isnt proot using the mount namespace? If so, the difference is explained in the quote in the article.

            Comment


            • #7
              Originally posted by macemoneta View Post
              How would this be different from proot?
              https://proot-me.github.io/
              PRoot relies on ptrace which has negative performance implications to say the least.

              Comment


              • #8
                I have been using chroot since 2013 as an unprivileged user.
                https://github.com/sabotage-linux/sa...42ace4c02244a6 bb005e069d037b

                Comment


                • #9
                  I apologize ahead of time for this

                  Originally posted by latalante View Post
                  I have been using chroot since 2013 as an unprivileged user.
                  https://github.com/sabotage-linux/sa...42ace4c02244a6 bb005e069d037b
                  I know times have been tough lately, COVID is rampant, money is hard to come by, the good people on both sides, but I've had the best people, the best, working on a new unprivileged chroot solution. It chroots 17x faster than any other existing chroot implementation and it takes care of all the White Privilege in the process. I call it The Super Duper Chroot. It's the BEST unprivileged chroot method and nothing comes close. The Russians won't know what happened when they try to mess with our systems and get trapped inside the Super Duper Chroot full of Fake News.

                  Comment


                  • #10
                    Originally posted by sindr View Post

                    PRoot relies on ptrace which has negative performance implications to say the least.
                    Sure, but only when root operations are intercepted. The rest of the time, performance isn't impacted.

                    Comment

                    Working...
                    X