▲ | pizlonator 5 days ago | |||||||||||||||||||||||||||||||
> How does it compare to something like RLBox? I don’t know and it doesn’t matter because RLBox doesn’t make your C code memory safe. It only containerizes it. Like, if you put a database in RLBox then a hacker could still use a memory safety bug to corrupt or exfiltrate sensitive data. If you put a browser engine in RLBox then a hacker could still pwn your whole machine: - If your engine has no other sandbox other than RLBox then they’d probably own your kernel by corrupting a buffer in memory that is being passed to a GPU driver (or something along those lines). RLBox will allow that corruption because the buffer is indeed in the program’s memory. - If the engine has some other sandbox on top of RLbox then the bad guys will corrupt a buffer used for sending messages to brokers, so they can then pop those brokers. Just as they would without RLbox. Fil-C prevents all of that because it uses a pointer capability model and enforces it rigorously. So, RLbox could be infinity faster than Fil-C and I still wouldn’t care | ||||||||||||||||||||||||||||||||
▲ | IshKebab 5 days ago | parent [-] | |||||||||||||||||||||||||||||||
That feels like a very binary view of security. There are certainly cases where something like RLBox takes you from "horrific anything-goes C security" to "probably fine". Image parsing for example, which is a common source of vulnerabilities. So the question of performance is still relevant, even if RLBox's security properties are less tight. | ||||||||||||||||||||||||||||||||
|