Mickaël Salaün

@l0kod
337 Followers
173 Following
190 Posts
I gave a talk at #FOSDEM about Island: Sandboxing tool powered by #Landlock
https://fosdem.org/2026/schedule/event/EW8M3R-island/
FOSDEM 2026 - Island: Sandboxing tool powered by Landlock

Island: Linux sandboxing tool powered by Landlock | Hacker News

Just released Island 🏝️, a sandboxing tool powered by #Landlock.
It auto‑confines processes according to the caller's context (e.g. CWD) and comes with slick Zsh integration, so you can use your terminal naturally without command prefixes. Feedback welcome!
https://github.com/landlock-lsm/island
The last 5.4.y kernel release has now happened: https://lore.kernel.org/all/2025120319-blip-grime-93e8@gregkh/

Please don't use this branch anymore, it's really old, and pretty obsolete, and has over 1500 unfixed CVEs in it:
https://lore.kernel.org/all/2025120358-skating-outage-7c61@gregkh/

And if you are stuck with that kernel version for some reason, go ask your vendor to fix those 1500+ CVEs, otherwise you are paying for support that doesn't actually do anything for you...
Linux 5.4.302 - Greg Kroah-Hartman

Once again FOSDEM will have a Security Devroom, please submit your talk! #fosdem #security https://lists.fosdem.org/pipermail/security-devroom/2025/000210.html
Call for Participation: Security Devroom @ FOSDEM'2026

The recording is already online!
https://youtu.be/tZuezmpfwy8
Sandboxing services with Landlock

YouTube
Talking about sandboxing services, I'll give a talk at #AllSystemsGo in a few hours about using #Landlock with systemd: https://cfp.all-systems-go.io/all-systems-go-2025/talk/FXWDCF/
Sandboxing services with Landlock All Systems Go! 2025

Landlock is an unprivileged kernel feature that enables all Linux users to sandbox their processes. Complementary to seccomp, developers can leverage Landlock to restrict their programs in a fine-grained way. While Landlock can be used by end users through sandboxer tools, there is currently no well-integrated solution to define security policies tailored to system services. Although AppArmor and seccomp security policies can already be tied to a system unit, we aim to provide a more dynamic, standalone, and unprivileged option with Landlock. In this talk, we'll briefly explain what Landlock is and highlight its differences from other Linux security features (e.g., namespaces, seccomp, other LSMs). We'll then focus on the new configuration format we are designing for Landlock security policies, its characteristics, and how it could extend systemd units by taking into account runtime context (e.g., XDG variables). See https://github.com/systemd/systemd/pull/39174

📢 🐧 The videos from LSS-EU 🇪🇺 2025 in Amsterdam 🇳🇱 are now up!

📺 Here is the playlist:

https://youtube.com/playlist?list=PLbzoR-pLrL6rSxIlgQx8OYw74Az63TpaB&si=6DEbDaY4GJMtIH1m
Before you continue to YouTube

I gave a (2nd) talk at #linuxsecuritysummit on a new configuration format, #Landlock Config, to define sandboxing security policies. The provided library (Rust and C for now) can also compose configurations to ease sharing and maintenance. This is especially useful to sandbox programs without modifying them, and to easily manage and audit Landlock policies. It could also be part of other configuration formats such as the OCI runtime specification.
https://lsseu2025.sched.com/event/25GET

https://github.com/landlock-lsm/landlockconfig

Linux Security Summit Europe 2025: Landlock Config - Mickaël Salaün, Micros...

View more about this event at Linux Security Summit Europe 2025