News: 0001611193

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Microsoft's New Open-Source Project: LiteBox As A Rust-Based Sandboxing Library OS

([Microsoft] 82 Minutes Ago Microsoft Litebox)


Microsoft engineers and other stakeholders have been developing LiteBox as a security-focused library OS written in the Rust programming language and leveraging Linux Virtualization Based Security "LVBS". The design is for LiteBox to operate as a secure kernel protecting the normal guest kernel via virtualization hardware.

LiteBox is self-described as:

LiteBox is a sandboxing library OS that drastically cuts down the interface to the host, thereby reducing attack surface. It focuses on easy interop of various "North" shims and "South" platforms. LiteBox is designed for usage in both kernel and non-kernel scenarios.

LiteBox exposes a Rust-y nix/rustix-inspired "North" interface when it is provided a Platform interface at its "South". These interfaces allow for a wide variety of use-cases, easily allowing for connection between any of the North--South pairs.

Example use cases include:

- Running unmodified Linux programs on Windows

- Sandboxing Linux applications on Linux

- Run programs on top of SEV SNP

- Running OP-TEE programs on Linux

- Running on LVBS

This Rust-based, security-essential OS project is open-source under the MIT license. LiteBox has yet to declare a stable release but the code is in the open and actively being developed on GitHub.

James Morris, the lead for Linux OS security and OSS engagement at Microsoft, [1]announced yesterday the availability of LiteBox.

Those interested in this Microsoft open-source OS effort can learn more about LiteBox or check out the code via [2]GitHub .



[1] https://social.kernel.org/notice/B2xBkzWsBX0NerohSC

[2] https://github.com/microsoft/litebox



Tact, n.:
The unsaid part of what you're thinking.