Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Open Source Linux

'Landrun': Lightweight Linux Sandboxing With Landlock, No Root Required (github.com) 29

Over on Reddit's "selfhosted" subreddit for alternatives to popular services, long-time Slashdot reader Zoup described a pain point:

- Landlock is a Linux Security Module (LSM) that lets unprivileged processes restrict themselves.

- It's been in the kernel since 5.13, but the API is awkward to use directly.

- It always annoyed the hell out of me to run random binaries from the internet without any real control over what they can access.


So they've rolled their own solution, according to Thursday's submission to Slashdot: I just released Landrun, a Go-based CLI tool that wraps Linux Landlock (5.13+) to sandbox any process without root, containers, or seccomp. Think firejail, but minimal and kernel-native. Supports fine-grained file access (ro/rw/exec) and TCP port restrictions (6.7+). No daemons, no YAML, just flags.

Example (where --rox allows read-only access with execution to specified path):

# landrun --rox /usr touch /tmp/file
touch: cannot touch '/tmp/file': Permission denied
# landrun --rox /usr --rw /tmp touch /tmp/file
#

It's MIT-licensed, easy to audit, and now supports systemd services.

'Landrun': Lightweight Linux Sandboxing With Landlock, No Root Required

Comments Filter:
  • LandLock (Score:5, Informative)

    by Zoup ( 640952 ) on Saturday April 05, 2025 @05:48PM (#65283917) Homepage
    To be clear, I don't think Landlock syscalls are difficult, they are simply not designed to be used on shell (No syscall is really!), Landlock maintainer did put years of effort behind developing this amazing feature in kernel!
  • Ok, but... (Score:5, Funny)

    by ffkom ( 3519199 ) on Saturday April 05, 2025 @05:55PM (#65283929)
    ... it is a little ironic that the README.md for a tool that is supposed to help mitigate the risk of running software from a random source on the Internet tells me to `go install github.com/zouuup/landrun/cmd/landrun@latest` ... that's a little like those VPN advertisers telling me "don't trust anyone... only trust us!".
    • Well, I mean you're running a Linux distro which by definition is a collection of software from random internet sources. At some point you have to trust someone unless you're willing to build the machine and write the code it runs from scratch.

      A bigger issue is the outright constant expectation of downloading random untrusted crap from the internet on a daily basis, because developers hate writing software that they don't get to control / monetize indefinitely. Such as webapps and dependencies that can't
      • by ffkom ( 3519199 )
        Having used open source software for decades it is not that I generally distrust authors of open source. But I distrust the excessive amounts of dependency downloads so fashionable with "online repositories" these days. If that one author of that one application turned out to be not trustworthy, ok, that is bad luck. But if the application requires a dependency tree with lots and lots of sources downloaded individually from many different repositories, then any single one of hundreds of collaborators being
        • But I distrust the excessive amounts of dependency downloads

          Having an online repository of public libraries that you can reuse without reinventing the wheel every time is the greatest value of opensource, right there with the "I can fix it myself" part.

          so fashionable with "online repositories" these days.

          Apparently you have not heard of CPAN, the first large pubic opensource library repository that became active and available in 1994 or 95. It was the first of its kind to make automatic dependency resolution and unattended installation a breeze. From source, too. It became a guiding light for virtually everyone, as di

    • All of their "privacy" and what not is centered around you trusting them first. The rest of them don't even pretend.

  • by test321 ( 8891681 ) on Saturday April 05, 2025 @05:59PM (#65283941)

    It always annoyed the hell out of me to run random binaries from the internet without any real control over what they can access.

    Totally agree! But when I tried to build landrun it downloads code from several github accounts. Random dependencies from the internet are a worse security risk than what it is trying to solve. I'd sandbox Firefox (the only binary to be an obvious entry point for hackers on a typical desktop machine). But for this I need to trust that none of the github accounts "russross", "urfave", "cpuguy83" or "xrash" on github have been compromised by hackers (unlikely but not impossible), and therefore increases the attack surface.

    go build -o landrun cmd/landrun/main.go

    go: downloading github.com/urfave/cli/v2 v2.27.6
    go: downloading github.com/landlock-lsm/go-landlock v0.0.0-20250303204525-1544bccde3a3
    go: downloading kernel.org/pub/linux/libs/security/libcap/psx v1.2.70
    go: downloading golang.org/x/sys v0.26.0
    go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.5
    go: downloading github.com/xrash/smetrics v0.0.0-20240521201337-686a1a2994c1
    go: downloading github.com/russross/blackfriday/v2 v2.1.0

    • Re: (Score:3, Interesting)

      by Zoup ( 640952 )

      It always annoyed the hell out of me to run random binaries from the internet without any real control over what they can access.

      Totally agree! But when I tried to build landrun it downloads code from several github accounts. Random dependencies from the internet are a worse security risk than what it is trying to solve. I'd sandbox Firefox (the only binary to be an obvious entry point for hackers on a typical desktop machine). But for this I need to trust that none of the github accounts "russross", "urfave", "cpuguy83" or "xrash" on github have been compromised by hackers (unlikely but not impossible), and therefore increases the attack surface.

      go build -o landrun cmd/landrun/main.go

      go: downloading github.com/urfave/cli/v2 v2.27.6 go: downloading github.com/landlock-lsm/go-landlock v0.0.0-20250303204525-1544bccde3a3 go: downloading kernel.org/pub/linux/libs/security/libcap/psx v1.2.70 go: downloading golang.org/x/sys v0.26.0 go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.5 go: downloading github.com/xrash/smetrics v0.0.0-20240521201337-686a1a2994c1 go: downloading github.com/russross/blackfriday/v2 v2.1.0

      Yeah agreed, the "Supply chain" problem of OSS will bite us in the ass someday, although if you are willing to trust me, you should definitely trust likes of unfave! :)

      • by test321 ( 8891681 ) on Saturday April 05, 2025 @06:34PM (#65283991)

        First thing, thanks a lot for this awesome contribution. I have used firejail and your tool improves by being simpler and elegant. I am willing to trust you, in particular because your code is short and easy to read (nothing looks scary or obfuscated). But then I also have to read dependencies, and those might also have dependencies.

        The recent attack on Disney was an engineer who trusted code on github. The account was legitimate and the code useful, but had been compromised by hackers (see this thread, it also includes links to the reddit discussion: https://it.slashdot.org/commen... [slashdot.org] ).

        There is a similar discussion about the standard library of Rust (e.g. https://nindalf.com/posts/rust... [nindalf.com] ). Some argue that a small standard library makes it difficult for rust to be adopted in secure environments because any useful code needs many crates, you'd need to audit them at each new version and that's impractical.

        In short I'll wait for the distro I use to package your tool and all its dependencies. The supply chain problem has bitten us hard already with npm and pypy, and I am reluctant to take more risks than just trusting a Mozilla binary.

        • by Zoup ( 640952 )
          my pleasure! thank you for having a look. Also agreed with points on supply chain, specially when it comes to NPM, PYPY stuff. I don't think OSS Distro package maintainers really have the time to go through the source before pushing package tho... this will only get worse with AI generated codes and explosion of number of packages. Should we all go "Ubuntu Pro"? they simply don't have the resources to package/review at this pace. the only thing I can think of is for likes of github to implement reliable AI
          • I don't think OSS Distro package maintainers really have the time to go through the source before pushing package tho...

            That's true. I also have a little hope for the "thousand eyes" effect. Once a package version is in one or several major distribution, it's enough for one of the many Debian or Fedora users to fall as victim and report it to shut down the entire thing long before I install it.

      • Hi! Since you are here, please note that the "--ldd" option, as you implemented it, is dangerous, since ldd may run the very code you are trying to sandbox. The "security" section of ldd's man page states: "Thus, you should never employ ldd on an untrusted executable, since this may result in the execution of arbitrary code." I'd advise removing or reworking that option.
    • Agreed. But not just compromised- at any point in time, merged in a PR that did some shady shit that nobody caught. This has also happened.
      Pulling in raw source deps from out on the internet is a fucking cancer.

      This shit is all open source licensed. Put the version of the library you used in your source.
      Is that inherently safer? Of course not- You could as easily be compromised. But at least the chain of trust doesn't turn into a fucking cobweb of trust.
    • I can't remember a build that went off and downloaded dependencies on its own. They throw an error and tell you to install prerequisites. Which you are free to do from source, if you so desire.

      • by Entrope ( 68843 )

        "go build" and "go install" will normally pull in (recursively) the dependencies that are declared in the manifest for the package you're building. This is balanced by the versions being identified by cryptographic hash of the contents, so a vulnerable or malicious version would need to be listed by the downstream package.

    • it downloads code from several github accounts. Random dependencies from the internet are a worse security risk than what it is trying to solve.

      What a shitty comment. Github accounts are not "random dependencies from the internet." Obviously your bogus assertion is just as shitty as your bogus premise. Feh.

      • Github accounts are not "random dependencies from the internet."

        They are if you're not checking each one to make sure it hasn't been compromised.

      • Bullshit they are exactly "random dependencies from the internet." because people like you are not capable of going through the code and vetting them your just blindly hitting the install button like any other Microsoft user.

        • Bullshit they are exactly "random dependencies from the internet." because people like you are not capable of going through the code and vetting them your just blindly hitting the install button like any other Microsoft user.

          You are trusting the original author to have chosen reasonable dependencies and locked the to a given safe checksum. That at least gives you traceability about who made the decision to use a specific version. The original author won't, however, have actually checked this particular version of a particular package. The correct solution is to get this integrated into actual Linux distributions where the distributors do the supply chain protection.

          • The correct solution is to get this integrated into actual Linux distributions where the distributors do the supply chain protection.

            Bingo.

  • by Gravis Zero ( 934156 ) on Saturday April 05, 2025 @06:49PM (#65284009)

    landlock(7) — Linux manual page [man7.org]

    Landlock - unprivileged access-control

    Landlock is an access-control system that enables any processes to
    securely restrict themselves and their future children. Because
    Landlock is a stackable Linux Security Module (LSM), it makes it
    possible to create safe security sandboxes as new security layers
    in addition to the existing system-wide access-controls. This
    kind of sandbox is expected to help mitigate the security impact
    of bugs, and unexpected or malicious behaviors in applications.

  • It's based on Bubblewrap. [github.com] It's also like Firejail without root access required.

  • Just in case you were lamenting that it's not written in Rust, fret no more, you can find one at https://github.com/souk4711/ha... [github.com]

    I wasn't able to make hakoniwas file-based restrictions to work, though. Complains about "fully incompatible access-rights". And its cli tool documentation is worse. Overall it seems the tool linked here is better.

The only perfect science is hind-sight.

Working...