[HN Gopher] Redbean Systems
       ___________________________________________________________________
        
       Redbean Systems
        
       Author : todsacerdoti
       Score  : 95 points
       Date   : 2023-06-18 20:02 UTC (2 hours ago)
        
 (HTM) web link (redbean.systems)
 (TXT) w3m dump (redbean.systems)
        
       | opportune wrote:
       | Do I get anything for breaking out of the sandbox or am I just
       | testing someone's side project for free?
       | 
       | edit: I tried anyway but the "API" just 502s, and the only thing
       | I've been able to get it to return is the HTML with the source
       | you see from the browser (but then later, just 502s), so I'm not
       | sure if somebody already beat me/borked it or if there is a bug
       | or what.
       | 
       | If I had to guess what happened, someone borked the HTTP server
       | handler processes in a way that's unrecoverable
        
         | klysm wrote:
         | It needs a bitcoin wallet or something hiding outside the
         | sandbox
        
         | rashkov wrote:
         | For the joy of hacking
        
         | lovasoa wrote:
         | It's back online; it was just a log file that grew too large.
        
       | 2h wrote:
       | doesn't work:
       | 
       | 502 Bad Gateway
        
       | IshKebab wrote:
       | I will be very surprised if SECCOMP and Landlock is enough to
       | secure Linux. Will be interesting to see the result of this
       | anyway!
        
         | rashkov wrote:
         | How come?
        
       | maxmcd wrote:
       | I'd love to understand more about what the ".verynice()" call
       | does. Source is here:
       | https://github.com/jart/cosmopolitan/blob/f10845ab9f847e4cad...
       | 
       | What are the effects of limiting a process priority?
        
         | anamexis wrote:
         | The wikipedia article for nice is a decent summary:
         | https://en.wikipedia.org/wiki/Nice_(Unix)
        
       | modeless wrote:
       | Context: "I'm building a new sandboxing technology. Who here
       | wants to hack into it?" From Justine Tunny (jart)
       | https://twitter.com/JustineTunney/status/1670465543470710785...
       | 
       | "It's a SECCOMP + Landlock LSM implementation of OpenBSD pledge()
       | and unveil(). Fully unprivileged sandboxing. No root or
       | containers required."
        
       ___________________________________________________________________
       (page generated 2023-06-18 23:00 UTC)