qyliss changed the topic of #spectrum to: A compartmentalized operating system | https://spectrum-os.org/ | Logs: https://logs.spectrum-os.org/spectrum/
pastbytes has quit [Quit: Leaving]
<MichaelRaskin> aaronjanse: it is way easier
<MichaelRaskin> Days of work instead of all that effort
<MichaelRaskin> And if you sandbox browsers and restrict how much is allowed into a single instance, you care much less about their sandboxing
<MichaelRaskin> D-Bus is fine, as long as it is D-Bus that is itself living inside the same jail, no?
<aaronjanse> Oh I think the issue was applications using dbus yo launch stuff outside their own jail
<aaronjanse> s/yo/to
<aaronjanse> But I assume that could be figured out
<MichaelRaskin> My solution: not having D-Bus sessions outside jails
<aaronjanse> Hmm. Yeah maybe jails would work
<aaronjanse> I assume it'd use bindmounts for /nix/store like what currently happens during builds, so containers would only see the packages they need
<MichaelRaskin> you: maybe jails would work. me: yeah, there are so many annoyances I avoid using my far-from-actually-secure jail setup
<MichaelRaskin> I don't actually think minimising store access is worth it
<MichaelRaskin> Maybe dropping the idea that store is a+rx could be reasonable (but Nix somewhat dislikes this idea…)
<MichaelRaskin> But if the availability of the store can be abused, either the attacker already has a full ACE and… store is not the most useful tool for attacking the jail, or it is something interesting and targeted, but then I can just give up
<aaronjanse> MichaelRaskin is your jails config public?
<MichaelRaskin> Yes. It is written in Common Lisp, though
<aaronjanse> That's fine
<MichaelRaskin> And I have only tried running the supporting daemon (which needs root and does all the work) under sinit
<aaronjanse> Is it this? https://github.com/7c6f434c/lang-os
<MichaelRaskin> Yes
<aaronjanse> Sweet
<MichaelRaskin> You are going to try to run it and see how horribly it breaks on mainline NixOS?
<MichaelRaskin> Or just looking up what the hell I am doing with nsjail parameters?
<MichaelRaskin> (In the latter case you might want to know that nsjail seems to support some kind of passing a configuration file)
<aaronjanse> Probably both :-)
<MichaelRaskin> I am pretty sure all this violates a few very hardcoded assumptions of systemd.
<MichaelRaskin> Because approximately every my workflow ends up violating some
<MichaelRaskin> Not sure if it matters in the specific case, of course
<MichaelRaskin> The code is Xorg-only, no Wayland (and applications get unfiltered access to Xorg, even)
nicoo has quit [Remote host closed the connection]
nicoo has joined #spectrum
Guest139081 is now known as JJJollyjim
cole-h has quit [Ping timeout: 240 seconds]
kinozawa has joined #spectrum
kinozawa has joined #spectrum
kinozawa has quit [Changing host]
cleeyv has quit [Ping timeout: 240 seconds]
v0idify has quit [Remote host closed the connection]
v0idify has joined #spectrum
pie_ has joined #spectrum
nyanotech has joined #spectrum
nyanotech has quit [Ping timeout: 245 seconds]
nyanotech has joined #spectrum
ehmry has quit [Quit: https://quassel-irc.org - Chat comfortably. Anywhere.]
ehmry has joined #spectrum
cleeyv has joined #spectrum
cleeyv has quit [Read error: Connection timed out]
cleeyv has joined #spectrum
cole-h has joined #spectrum
JJJollyjim has quit [Ping timeout: 276 seconds]
joe[m] has quit [Ping timeout: 276 seconds]
josias has quit [Ping timeout: 276 seconds]
mvnetbiz_ has quit [Ping timeout: 276 seconds]
danielrf[m] has quit [Ping timeout: 276 seconds]
JJJollyjim has joined #spectrum
joe[m] has joined #spectrum
josias has joined #spectrum
mvnetbiz_ has joined #spectrum
danielrf[m] has joined #spectrum
jpds has quit [Quit: WeeChat 3.1]
jpds has joined #spectrum
jpds has quit [Quit: WeeChat 3.1]
jpds has joined #spectrum
jpds has quit [Ping timeout: 240 seconds]
jpds has joined #spectrum
qyliss has quit [Quit: bye]
jb55 has quit [Ping timeout: 240 seconds]