Skip to content

Commit

Permalink
Add blog post about Dangerzone integration
Browse files Browse the repository at this point in the history
This PR depends on #10936.

It adds a blog post about Dangerzone & gVisor integration. The same blog post is being posted on the Dangerzone blog: freedomofpress/dangerzone.rocks#48

When published, it will appear at the following URL: `https://gvisor.dev/blog/2024/09/23/safe-ride-into-the-dangerzone/`

Preview:
![dangerzone-preview](https://github.com/user-attachments/assets/be889fb4-0b49-4bdb-931d-8a06a6b1e265)
FUTURE_COPYBARA_INTEGRATE_REVIEW=#10937 from EtiennePerot:dangerzone-blog-post a5c7ab4
PiperOrigin-RevId: 677215115
  • Loading branch information
EtiennePerot authored and gvisor-bot committed Sep 21, 2024
1 parent a7dcce9 commit b1be774
Show file tree
Hide file tree
Showing 25 changed files with 472 additions and 11 deletions.
10 changes: 10 additions & 0 deletions website/_config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,8 @@ plugins:
- jekyll-sitemap
site_url: https://gvisor.dev
feed:
title: "gVisor blog"
url: https://gvisor.dev
path: blog/index.xml
svg:
optimize: true
Expand All @@ -25,6 +27,14 @@ defaults:
layout: default
analytics: "UA-150193582-1"
authors:
almet:
name: Alexis Métaireau
email: [email protected]
url: https://notmyidea.org
apyrgio:
name: Alex Pyrgiotis
email: [email protected]
url: https://freedom.press/people/alex-p
ayushranjan:
name: Ayush Ranjan
email: [email protected]
Expand Down
11 changes: 9 additions & 2 deletions website/_sass/style.scss
Original file line number Diff line number Diff line change
Expand Up @@ -183,7 +183,7 @@ table th {
margin: 20px auto;
}

.blog-content .attribution {
.blog-content .attribution, .blog-content figcaption {
/* Stay close to the image. */
display: block;
margin-top: 6px;
Expand All @@ -195,13 +195,20 @@ table th {
color: $text-color-secondary;
}

.blog-content * img:has(+ .attribution) {
.blog-content * img:has(+ .attribution), .blog-content * img:has(+ figcaption) {
/* Remove bottom margins from images where there is an attribution line
* immediately following the image.
*/
margin-bottom: 0px;
}

.blog-content .attribution, .blog-content figcaption {
/* Remove margin above image caption. */
margin-top: 0px;
/* Add margin under image caption. */
margin-bottom: 1em;
}

.blog-content details {
margin-left: 2em;
margin-right: 2em;
Expand Down
1 change: 1 addition & 0 deletions website/assets/images/2024-09-23-dangerzone-outline.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
1 change: 1 addition & 0 deletions website/assets/images/2024-09-23-gvisor-outline.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
2 changes: 2 additions & 0 deletions website/blog/2019-11-18-security-basics.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,8 @@ and _platform portability_ (run gVisor wherever Linux OCI containers run).
Delivering on each of these goals requires careful security considerations and a
robust design.

<!--/excerpt-->

## What does "sandbox" mean?

gVisor allows the execution of untrusted containers, preventing them from
Expand Down
2 changes: 2 additions & 0 deletions website/blog/2020-04-02-networking-security.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ networking architecture of gVisor, and the tradeoffs involved. In particular, we
will cover how these principles culminated in two networking modes, how they
work, and the properties of each.

<!--/excerpt-->

## gVisor's security architecture in the context of networking

Linux networking is complicated. The TCP protocol is over 40 years old, and has
Expand Down
2 changes: 2 additions & 0 deletions website/blog/2020-09-18-containing-a-real-vulnerability.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,8 @@ gVisor's security. While gVisor is not immune to vulnerabilities,
[we take several steps](https://gvisor.dev/security/) to minimize the impact and
remediate if a vulnerability is found.

<!--/excerpt-->

## Escaping the Container

First, let’s describe how the discovered vulnerability works. There are numerous
Expand Down
2 changes: 2 additions & 0 deletions website/blog/2020-10-22-platform-portability.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,8 @@ requires expensive bare-metal machines or cloud instances to run safely with
good performance, increasing cost and complexity for Cloud users. gVisor,
however, takes a more flexible approach.

<!--/excerpt-->

**NOTE 2024-05**: This post describes the ptrace and KVM platforms, which were
the only two gVisor platforms at the time it was written. The
[Systrap platform](/blog/2023/04/28/systrap-release/) was added since and
Expand Down
2 changes: 2 additions & 0 deletions website/blog/2021-08-31-gvisor-rack.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,8 @@ gVisor has implemented the [RACK](https://datatracker.ietf.org/doc/html/rfc8985)
(Recent ACKnowledgement) TCP loss-detection algorithm in our network stack,
which improves throughput in the presence of packet loss and reordering.

<!--/excerpt-->

TCP is a connection-oriented protocol that detects and recovers from loss by
retransmitting packets. [RACK](https://datatracker.ietf.org/doc/html/rfc8985) is
one of the recent loss-detection methods implemented in Linux and BSD, which
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,8 @@ many measures. As a container runtime, gVisor provides container-native security
without sacrificing resource efficiency. Therefore, it has been on our radar
since it was released.

<!--/excerpt-->

However, there have been performance concerns raised by members of
[academia](https://www.usenix.org/system/files/hotcloud19-paper-young.pdf) and
[industry](https://news.ycombinator.com/item?id=19924036). Users of gVisor tend
Expand Down
2 changes: 2 additions & 0 deletions website/blog/2022-08-31-threat-detection.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,8 @@ provides the ability for an external process to observe application behavior and
detect threats at runtime. Using this mechanism, gVisor users can watch actions
performed by the container and generate alerts when something unexpected occurs.

<!--/excerpt-->

A monitoring process can connect to the gVisor sandbox and receive a stream of
actions that the application is performing. The monitoring process decides what
actions are allowed and what steps to take based on policies for the given
Expand Down
2 changes: 2 additions & 0 deletions website/blog/2022-10-24-buffer-pooling.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,8 @@ gVisor can do all packet processing internally and only has to enable a few host
I/O syscalls for near-complete networking capabilities. This keeps gVisor’s
exposure to host vulnerabilities as narrow as possible.

<!--/excerpt-->

Although writing Netstack in Go was important for runtime safety, up until now
it had an undeniable performance cost. iperf benchmarks showed Netstack was
spending between 20-30% of its processing time allocating memory and pausing for
Expand Down
2 changes: 1 addition & 1 deletion website/blog/2023-04-28-systrap-release.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ virtualization. Unlike the ptrace platform, it’s fast 🚀. Go try it by addin
`--platform=systrap` to the runsc flags. If you want to know more about it, read
on.

--------------------------------------------------------------------------------
<!--/excerpt-->

gVisor is a security boundary for arbitrary Linux processes. Boundaries do not
come for free, and gVisor imposes some performance overhead on sandboxed
Expand Down
2 changes: 1 addition & 1 deletion website/blog/2023-05-08-rootfs-overlay.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ a tmpfs filesystem. Learn more about this feature in the following blog that was
[originally posted](https://opensource.googleblog.com/2023/04/gvisor-improves-performance-with-root-filesystem-overlay.html)
on [Google Open Source Blog](https://opensource.googleblog.com/).

--------------------------------------------------------------------------------
<!--/excerpt-->

## Costly Filesystem Access

Expand Down
3 changes: 2 additions & 1 deletion website/blog/2023-06-20-gpu-pytorch-stable-diffusion.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,12 +7,13 @@ generate images using a GPU from within gVisor. Both the
and the [PyTorch] code used by Stable Diffusion were run entirely within gVisor
while being able to leverage the NVIDIA GPU.

<!--/excerpt-->

![A sandboxed GPU](/assets/images/2023-06-20-sandboxed-gpu.png "A sandboxed GPU.")
<span class="attribution">**Sand**boxing a GPU. Generated with Stable Diffusion
v1.5.<br/>This picture gets a lot deeper once you realize that GPUs are made out
of sand.</span>

--------------------------------------------------------------------------------

## Disclaimer

Expand Down
2 changes: 1 addition & 1 deletion website/blog/2023-06-27-directfs.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ the following blog that was
[originally posted](https://opensource.googleblog.com/2023/06/optimizing-gvisor-filesystems-with-directfs.html)
on [Google Open Source Blog](https://opensource.googleblog.com/).

--------------------------------------------------------------------------------
<!--/excerpt-->

## Origins of the Gofer

Expand Down
4 changes: 2 additions & 2 deletions website/blog/2024-02-01-seccomp.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,14 +10,14 @@ is actually executed. **This blog post contains more than you ever wanted to
know about `seccomp-bpf`, and explores the past few months of work to optimize
gVisor's use of it.**

<!--/excerpt-->

![gVisor and seccomp](/assets/images/2024-02-01-gvisor-seccomp.png "gVisor and seccomp"){:style="max-width:100%"}
<span class="attribution">A diagram showing gVisor's two main layers of
security: gVisor itself, and `seccomp-bpf`. This blog post touches on the
`seccomp-bpf` part.
[Tux logo by Larry Ewing and The GIMP](https://commons.wikimedia.org/wiki/File:Tux.svg).</span>

--------------------------------------------------------------------------------

## Understanding `seccomp-bpf` performance in gVisor {#performance-considerations}

One challenge with gVisor performance improvement ideas is that it is often very
Expand Down
Loading

0 comments on commit b1be774

Please sign in to comment.