Unprivileged Sandboxing
In unprivileged sandboxing, every process should be able to make use of sandboxing.
The key idea is that after each sandbox policy enforcement, a process can only do a subset of the operations that it could do before, and there is no way to regain these rights for that process.
On Linux, this is a contrast to other sandboxing mechanisms like AppArmor and SeLinux, where policies can only be defined by privileged users (e.g. root
).
Some unprivileged sandboxing mechanisms are:
With LinuxNamespaces, the story is more convoluted - They traditionally require higher privileges to use, but these can on some Linux installations be attained through UnprivilegedUserNamespaces.