[HN Gopher] Redbean Systems
___________________________________________________________________
Redbean Systems
Author : todsacerdoti
Score : 95 points
Date : 2023-06-18 20:02 UTC (2 hours ago)
(HTM) web link (redbean.systems)
(TXT) w3m dump (redbean.systems)
| opportune wrote:
| Do I get anything for breaking out of the sandbox or am I just
| testing someone's side project for free?
|
| edit: I tried anyway but the "API" just 502s, and the only thing
| I've been able to get it to return is the HTML with the source
| you see from the browser (but then later, just 502s), so I'm not
| sure if somebody already beat me/borked it or if there is a bug
| or what.
|
| If I had to guess what happened, someone borked the HTTP server
| handler processes in a way that's unrecoverable
| klysm wrote:
| It needs a bitcoin wallet or something hiding outside the
| sandbox
| rashkov wrote:
| For the joy of hacking
| lovasoa wrote:
| It's back online; it was just a log file that grew too large.
| 2h wrote:
| doesn't work:
|
| 502 Bad Gateway
| IshKebab wrote:
| I will be very surprised if SECCOMP and Landlock is enough to
| secure Linux. Will be interesting to see the result of this
| anyway!
| rashkov wrote:
| How come?
| maxmcd wrote:
| I'd love to understand more about what the ".verynice()" call
| does. Source is here:
| https://github.com/jart/cosmopolitan/blob/f10845ab9f847e4cad...
|
| What are the effects of limiting a process priority?
| anamexis wrote:
| The wikipedia article for nice is a decent summary:
| https://en.wikipedia.org/wiki/Nice_(Unix)
| modeless wrote:
| Context: "I'm building a new sandboxing technology. Who here
| wants to hack into it?" From Justine Tunny (jart)
| https://twitter.com/JustineTunney/status/1670465543470710785...
|
| "It's a SECCOMP + Landlock LSM implementation of OpenBSD pledge()
| and unveil(). Fully unprivileged sandboxing. No root or
| containers required."
___________________________________________________________________
(page generated 2023-06-18 23:00 UTC)