[subterfugue-announce] [ANNOUNCE] SUBTERFUGUE 0.1.9
Status: Alpha
Brought to you by:
mkc
From: Mike C. <mk...@kc...> - 2000-03-17 20:21:47
|
SUBTERFUGUE 0.1.9 is available. This release contains two substantial improvements. First is a fast ignored-call loop, in C, written by Pavel Machek. The actual speedup will vary depending on what fraction of system calls each trick needs to follow, but for tricks that only follow a few calls (e.g., sandboxes), the speedup is quite noticeable, particularly after initial application startup. Second is a feature (a hack) that will enable you to run SUBTERFUGUE on a vanilla kernel, 2.3.99-pre1 or later. Running without the patch is perhaps only half as fast as with, but now you can try SUBTERFUGUE without having to make a special kernel. (The next-to-last SUBTERFUGUE patchlet was included in 2.3.99-pre1. [Hooray!!] If the last patchlet makes it in by 2.4, this hack will go away.) As always, feedback is welcome. Have fun! ============================================================================== >From NEWS: Version 0.1.9 ("pagliacci") * Added fast (in C) ignored-call loop from Pavel Machek. * Added '--waitchannelhack', which will allow SUBTERFUGUE to run (albeit slowly) with no kernel patch on linux 2.3.99 or later. * The '--output' flag now accepts a file descriptor number as an argument, making it easier to separate SUBTERFUGUE output from that of the traced program. * More bug fixes. ============================================================================== This is SUBTERFUGUE. See 'NEWS' for info on the latest release. SUBTERFUGUE is a framework for observing and playing with the reality of software; it's a foundation for building tools to do tracing, sandboxing, and many other things. You could think of it as "strace meets expect." Here's a short (real) "screenshot" which hints at one of its possible uses: # sf --trick=SimplePathSandbox:"read=['/'];write=['/dev/tty'];net=1" bash # id uid=0(root) gid=0(root) groups=0(root) # rm -f /etc/passwd write deny (unlink): '/etc/passwd' rm: cannot unlink `/etc/passwd': Permission denied BEWARE: This is an alpha release. It might not hose your system, but who can say? You probably shouldn't even be reading this. Don't run this as root, except on a scratch system. Don't use it to run programs where a loss of state might be disastrous (e.g., fetchmail). Consider yourself warned. See 'http://subterfugue.org' for more info. |