Nicholas J. Kain e08d3b15b5 Remove seccomp support.
It breaks with the existing whitelists on the latest glibc and is
just too much maintenance burden.  It also causes the most questions
for new users.

Something like openbsd's pledge() would be fine, but I have no
intention of maintaining such a thing.

Most of the value-gain would come from disallowing high-risk
syscalls like ptrace() and the perf syscalls, anyway.

ndhc already uses extensive defense-in-depth and wasn't using
seccomp on non-(x86|x86-64) platforms, so it's not a huge loss.
2018-02-09 03:33:04 -05:00
..
2018-02-09 03:16:59 -05:00
2018-02-09 03:33:04 -05:00
2018-02-09 03:16:59 -05:00
2018-02-09 03:33:04 -05:00
2018-02-09 03:33:04 -05:00
2018-02-09 03:33:04 -05:00
2018-02-09 03:16:59 -05:00
2018-02-09 03:16:59 -05:00
2018-02-09 03:16:59 -05:00
2018-02-09 03:33:04 -05:00