[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#860067: ITP: minijail -- Utility to run a program inside a sandbox



Package: wnpp
Severity: wishlist
Owner: Andrew Pollock <apollock@debian.org>

* Package name    : minijail
  Version         : 1
  Upstream Author : Jorge Lucángeli Obes <jorgelo@chromium.org>
* URL             : https://www.chromium.org/chromium-os/developer-guide/chromium-os-sandboxing
* License         : BSD
  Programming Lang: C, C++
  Description     : Utility to run a program inside a sandbox

minijail provides a consistent method to sandbox of services and applications,
using a mix of capability restrictions, user ID compartmentalisation, namespace
isolation and seccomp.

It is the sandboxing tool of choice for Chromium OS and Android.

 - why is this package useful/relevant? 
   It's a useful security enhancement that could potentially be used by 
   other packages. There's potential functionality overlap with firejail
 - how do you plan to maintain it? 
   I'm open to maintaining this under collab-maint


Reply to: