en.osm.town is one of the many independent Mastodon servers you can use to participate in the fediverse.
An independent, community of OpenStreetMap people on the Fediverse/Mastodon. Funding graciously provided by the OpenStreetMap Foundation.

Server stats:

261
active users

#landlock

0 posts0 participants0 posts today
Yes, #slackware current includes #Landlock support in the testing group with #kernel 6.14.
However, you must enable it at boot. If you're using #GRUB, follow these steps:

1. Add the following line to /etc/default/grub:

GRUB_CMDLINE_LINUX_DEFAULT="lsm=landlock"

2. Regenerate the GRUB configuration:

geninitrd

3. Reboot your system and verify that Landlock is enabled:

sudo dmesg | grep landlock

Example output:

[ 0.000000] Command line: BOOT_IMAGE=/boot/vmlinuz-generic root=UUID=... ro lsm=landlock
[ 0.068388] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-generic root=UUID=... ro lsm=landlock
[ 0.212270] LSM: initializing lsm=capability,landlock
[ 0.212270] landlock: Up and running.

Once enabled, you can use landrun on Slackware-current:
https://slackbuilds.org/repository/15.0/network/landrun/
slackbuilds.orgSlackBuilds.org - landrunSlackBuilds.org - SlackBuild Script Repository

I'd like to share something nice that I am currently working on: A Landlock integration for Forgejo.

Landlock (landlock.io) lets userspace processes tell the kernel "hey kernel, please only let me access the following filesystem resources" (and it also supports sockets, etc. now).

My integration only limits unfettered access to arbitrary files. It needs a lot more yak shaving (refactoring, configurations, using the PATH variable for Git binaries) and time.

@l0kod Hi! I just wanted to let you know that we recently merged a PR using #Landlock to restrict access to the filesystem for the downloader process of the pacman package manager: gitlab.archlinux.org/pacman/pa
If you are bored and see anything wrong, please feel free to ping me or Allan :) In any case, thanks a lot for Landlock, it's awesome!

GitLabRestrict filesystem access to the download process whenever possible (!167) · Merge requests · Pacman / Pacman · GitLabHi! This is a follow-up to the sandboxing work, restricting filesystem access to the downloader process when sandboxing is enabled and LandLock support is available. Right...

Today, let's give a look to our "Host Protection" session:

🚀 Discover @kunai_project
by its developer Quentin JEROME

🛡️ Python Apps protection with #PyRASP by @rbidou

🔬 Latest features of #oletools by @decalage

+ 3 workshops on #landlock, #Sudo & #Kunai by their developers: @l0kod, @PCzanik and Quentin JEROME 😍

👉 Book your (free) seat: pretix.eu/passthesalt/2024/

👉 The agenda: cfp.pass-the-salt.org/pts2024/