The Sandboxie Windows Sandbox Isolation Tool Is Now Open-Source (bleepingcomputer.com) 22
Cybersecurity firm Sophos announced today that it has open-sourced the Sandboxie Windows sandbox-based isolation utility 15 years after it was released. Bleeping Computer reports: Sandboxie was initially developed by Ronen Tzur and released on June 26, 2004, as a simple utility to help run Internet Explorer within a secure and isolated sandbox environment. Later, Tzur upgraded Sandboxie to also support sandboxing any other Windows applications that required a secure virtual sandbox for while running. Invincea acquired Sandboxie from Tzur in December 2013 and the app eventually moved under Sophos' software umbrella after the cybersecurity firm announced Invincea's acquisition in February 2017.
"We are thrilled to give the code to the community," Sophos Director of Product Marketing Seth Geftic said. "The Sandboxie tool has been built on many years of highly-skilled developer work and is an example of how to integrate with Windows at a very low level. The Sandboxie user base represents some of the most passionate, forward-thinking, and knowledgeable members of the security community, and we hope this announcement will spawn a fresh wave of ideas and use cases." You can download Sandboxie and its source code here.
"We are thrilled to give the code to the community," Sophos Director of Product Marketing Seth Geftic said. "The Sandboxie tool has been built on many years of highly-skilled developer work and is an example of how to integrate with Windows at a very low level. The Sandboxie user base represents some of the most passionate, forward-thinking, and knowledgeable members of the security community, and we hope this announcement will spawn a fresh wave of ideas and use cases." You can download Sandboxie and its source code here.
Is it a whitelist or a blacklist solution? (Score:2)
Since I'm a Linux user, I'm asking anyone who used this: Is it trying to identify and block all the known ways a program could leave the sandbox? Or blocking all API actions, and instructions, *unless allowed*? Liike a RBAC solution.) And if the latter, then how smart, regarding the context-sensitivity of its rules, is it?
Re:Is it a whitelist or a blacklist solution? (Score:5, Informative)
I think it's a filter driver, so it hooks the parts where user-mode code makes system calls to kernel-mode code.
When you make a Win32 API call, you first run the API entry point from "Kernel32.dll" (a user-mode library). That will make a call to NTDLL.dll (also a user-mode library), and the code inside NTDLL will run SYSENTER, and switch to Kernel mode, where the actual code is implemented.
A filter driver intercepts between SYSENTER and the kernel's code running.
There are also other possible ways to hook DLLs. One common method is to replace which user-mode functions you get when a program imports a DLL, loads a DLL, or gets a function address out of a DLL. This is sufficient for well-behaved Windows programs. But only the well-behaved ones.
Without hooking the transition from User to Kernel, you leave the door open to get into the real kernel-level API calls.
Re: Is it a whitelist or a blacklist solution? (Score:1)
This still leaves the question if the filter driver is a whitelist or a blacklist solution though. :)
Re:Is it a whitelist or a blacklist solution? (Score:5, Informative)
The release is fraudulent. It claims to be licenced under GPL 3.0 but it requires anyone who wants to download the code to agree to some nebulous Sophos EULA legalese restrictions that conflict with open source licencing.
Re: (Score:1)
Not a marketing strategy. (Score:1)
As far as I can tell, this is literally breaking the law.
Re: Is it a whitelist or a blacklist solution? (Score:1)
Expect the EFF to sue their asses.
Thanks. There's hardly a worse thing to start off on, when you want people to trust you. This kills it dead in the water, right there.
Re: (Score:3)
Re: (Score:2)
To give them some benefit of doubt, it is possible they just botched the web site transition.
Someone placed it on GitHub.
https://github.com/DavidXanato... [github.com]
But really, Sophos should have an official repository if they were going about it the right way.
Re: (Score:2)
Not really. If Sophos owns the code, they can insist on both. You see, Sophos can license the code to you under any license they wish, and insist that every distribution afterwards be GPLv3. As copyright holder, they are able to do whatever they want with the code. They can restrict you fro
Isn't this what an OS is already supposed to do? (Score:1)
Am I missing something here?
Re: (Score:2, Insightful)
Real operating systems do. This is for the toy OS/marketing platform Windows.
What happened to Slashdot? (Score:2)
Re: (Score:2)
If everyone is at home nowadays where are they going instead of Slashdot?
In the hospital on ventilators, where the success ratio seems to be maybe 20%. (I read that apparently it's so bad that doctors are starting to use Vs as a last resort. IANAD, but probably WILL be a patient in the next few months.) Unfortunately, talking to a nurse friend of mine, we both agree I would be a middle-risk patient. So I'm joking here, but only mostly.
Re: (Score:1)
If everyone is at home nowadays where are they going instead of Slashdot?
Reddit? ArsTechnica?
The quality of Slashdot articles has suffered greatly over the years. This one is barely more than a quote from another site plus two links. It seems people are finally catching on.
Also, censorship which used to be completely absent is creeping in. A few times, I wanted to revisit posts but could not find them, even browsing at -1 or using Google. That is another thing not everyone likes.
Re: (Score:2)
If everyone is at home nowadays where are they going instead of Slashdot?
The function of Slashdot used to be a distraction from your tedious tech job. But now we are all *hunkered down in our 'rona bunker* our lives are too busy and interesting to need job diversions while we:
killer app (Score:2)