Open JeremyRand opened 10 months ago
It sounds like @handpickencounter has some code sitting around for this purpose?
They also said:
suggestion - simply unshare the network namepsace (no interfaces, no listening ports) so no need to block any packets. utilize tor's ability to create unix domain sockets for socks5 listeners.
You can do
unshare --net -- socktrace ... -- app
The way I usually do it is with a more comprehensive setup for bwrap (bubblewrap) and unshare more things, apply seccomp, private writable /home dir etc
As @adrelanos suggested on the Whonix forum, it would be desirable to implement a Linux Namespaces wrapper for Horklump, so that even if a malicious tracee escapes from the ptrace sandbox, it still won't be able to bypass the proxy.
(This is not a replacement for ptrace, just a defense-in-depth tactic.)