2000-10-30 10:53:23

by mkc

[permalink] [raw]
Subject: [ANNOUNCE] SUBTERFUGUE 0.1.99

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUBTERFUGUE 0.1.99 is available. It's been updated to work with the latest
kernel (linux-2.4.0-test9), and there are new tricks, documentation, and a
Debian package. (see below)

As always, feedback is welcome.

Have fun!
- --Mike


==============================================================================
NEWS:

Version 0.1.99 ("superstar")

* Added a fix to make SUBTERFUGUE work again with the latest 2.4 kernels.
Made usage of the "wait channel hack" the default, for vanilla 2.4 users.

* Added two new tricks, NetThrottle and TimeWarp, which you can see in action
now at the bottom of the screenshots page
(http://subterfugue.org/screenshot.html). NetThrottle, in particular, seems
like it would be handy for everyday use. (TimeWarp is more of an amusement,
though it might help you cheat at certain arcade games. :-)

* Added a polished version of the SUBTERFUGUE motivation document to the web
site (http://subterfugue.org/motivation.html). Comments welcome. It's
pretty over-the-top. Does it sound like it was composed in a remote Montana
cabin? :-0

* Added a man page for sf(1), based on Pavel Machek's original draft.

* Added an 'install' target and Debianization. A Debian package will be
available with this release. It hasn't been tested much yet, but it's
probably pretty safe.

* Reorganized the C extension modules.

* Generally dusted off all of the cobwebs. SUBTERFUGUE lives!


==============================================================================
README:

This is SUBTERFUGUE. See 'NEWS' for info on the latest release.

SUBTERFUGUE is a framework for observing and playing with the reality of
software; it's a foundation for building tools to do tracing, sandboxing, and
many other things. You could think of it as "strace meets expect."

Here's a short (real) "screenshot" which hints at one of its possible uses:

# sf --trick=SimplePathSandbox:"read=['/'];write=['/dev/tty'];net=1" bash
# id
uid=0(root) gid=0(root) groups=0(root)
# rm -f /etc/passwd
write deny (unlink): '/etc/passwd'
rm: cannot unlink `/etc/passwd': Permission denied


BEWARE: This is an alpha release. Don't run this as root, except on a scratch
system. Don't use it to run programs where a loss of state might be
disastrous (e.g., fetchmail). Consider yourself warned.

See 'http://subterfugue.org' and the sf(1) man page for more info.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.5 and Gnu Privacy Guard <http://www.gnupg.org/>

iD8DBQE5/VKyHxpYi0vMj/QRAjL/AKClNUGMEevtvFil9TTAd5ykPblVQQCgtFuG
btTp1IdqYi6lfWDzUwgh8cQ=
=5N9W
-----END PGP SIGNATURE-----


2000-10-31 06:44:43

by Mike Coleman

[permalink] [raw]
Subject: [ANNOUNCE] SUBTERFUGUE 0.1.99a (bugfix)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This mini-release just fixes a bug that could allow processes to escape
tracing under certain circumstances. If you plan to make use of 'sf', you
should upgrade.

- --Mike


See http://subterfugue.org for info on SUBTERFUGUE.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.5 and Gnu Privacy Guard <http://www.gnupg.org/>

iD8DBQE5/mo0HxpYi0vMj/QRAmE6AJ9N/V57LZ6qUzYdSOsiAihqACQIEgCfVm7h
KShS58o2uzOWHyMUtUg5U9A=
=YKmp
-----END PGP SIGNATURE-----