| ▲ | pizlonator a day ago | |||||||||||||
Posts like the one I made about how to do sandboxing are specifically to make the runtime transparent to folks so that meaningful auditing can happen. > For example, Filip mentioned that some setuid programs can be compiled with it, but it also makes changes to ld.so. I pointed this out to the author on Twitter, as it could be problematic. The changes to ld.so are tiny and don’t affect anything interesting to setuid. Basically it’s just one change: teaching the ld.so that the layout of libc is different. More than a month ago, I fixed a setuid bug where the Fil-C runtime was calling getenv rather than secure_getenv. Now I’m just using secure_getenv. > In other words, these are still teething problems with Fil-C, which will be reviewed and fixed over time. I just want to point out that using it for real-world "infrastructures" might be somewhat risky at this point. We need unix nerds to experiment with. There’s some truth to what you’re saying and there’s also some FUD to what you’re saying. Like a perfectly ambiguous mix of truth and FUD. Good job I guess? | ||||||||||||||
| ▲ | fc417fc802 18 hours ago | parent | next [-] | |||||||||||||
Is it FUD? Approximately speaking, all software has bugs. Being an early adopter for security critical things is bound to carry significant risk. It seems like a relevant topic to bring up in this sort of venue for a project of this sort. | ||||||||||||||
| ||||||||||||||
| ▲ | walterbell a day ago | parent | prev | next [-] | |||||||||||||
> a perfectly ambiguous mix of truth and FUD Congrats on Fil-C reaching heisentroll levels! | ||||||||||||||
| ▲ | 8 hours ago | parent | prev [-] | |||||||||||||
| [deleted] | ||||||||||||||