-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUBTERFUGUE 0.1.99 is available. It's been updated to work with the latest
kernel (linux-2.4.0-test9), and there are new tricks, documentation, and a
Debian package. (see below)
As always, feedback is welcome.
Have fun!
- --Mike
==============================================================================
NEWS:
Version 0.1.99 ("superstar")
* Added a fix to make SUBTERFUGUE work again with the latest 2.4 kernels.
Made usage of the "wait channel hack" the default, for vanilla 2.4 users.
* Added two new tricks, NetThrottle and TimeWarp, which you can see in action
now at the bottom of the screenshots page
(http://subterfugue.org/screenshot.html). NetThrottle, in particular, seems
like it would be handy for everyday use. (TimeWarp is more of an amusement,
though it might help you cheat at certain arcade games. :-)
* Added a polished version of the SUBTERFUGUE motivation document to the web
site (http://subterfugue.org/motivation.html). Comments welcome. It's
pretty over-the-top. Does it sound like it was composed in a remote Montana
cabin? :-0
* Added a man page for sf(1), based on Pavel Machek's original draft.
* Added an 'install' target and Debianization. A Debian package will be
available with this release. It hasn't been tested much yet, but it's
probably pretty safe.
* Reorganized the C extension modules.
* Generally dusted off all of the cobwebs. SUBTERFUGUE lives!
==============================================================================
README:
This is SUBTERFUGUE. See 'NEWS' for info on the latest release.
SUBTERFUGUE is a framework for observing and playing with the reality of
software; it's a foundation for building tools to do tracing, sandboxing, and
many other things. You could think of it as "strace meets expect."
Here's a short (real) "screenshot" which hints at one of its possible uses:
# sf --trick=SimplePathSandbox:"read=['/'];write=['/dev/tty'];net=1" bash
# id
uid=0(root) gid=0(root) groups=0(root)
# rm -f /etc/passwd
write deny (unlink): '/etc/passwd'
rm: cannot unlink `/etc/passwd': Permission denied
BEWARE: This is an alpha release. Don't run this as root, except on a scratch
system. Don't use it to run programs where a loss of state might be
disastrous (e.g., fetchmail). Consider yourself warned.
See 'http://subterfugue.org' and the sf(1) man page for more info.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.5 and Gnu Privacy Guard <http://www.gnupg.org/>
iD8DBQE5/VKyHxpYi0vMj/QRAjL/AKClNUGMEevtvFil9TTAd5ykPblVQQCgtFuG
btTp1IdqYi6lfWDzUwgh8cQ=
=5N9W
-----END PGP SIGNATURE-----
|