I am new to the domain of running Linux application in secure contexts, such as jails.
I am seeking to run a desktop environment, on a Linux system, that has essentially the same capabilities as such an environment running in a normal context, with respect to hardware access, such as to sound, graphics, and peripherals, but that has a filtered view of the file system, lacking write access to /tmp
, /var/tmp
, any part of /home
or indeed any part of the filesystem not designated as accessible for writing. The directories normally accessible to applications would be mapped into specific locations that would be the only locations manipulated by applications running under the restricted context.
Put another way, changes made by applications running in such a context to the filesystem could appear as changed only within the context, but not outside, by virtue of a layered system. Thus, any trace of the environment could be removed easily, while leaving the rest of the system entirely intact.
Ideally, it would be possible to operate the desktop environment restrained to secure environment simultaneous to running the an instance of a desktop environment in the regular context.
What tools might be the ones I should investigate?
/dev
and/proc
would seem not a concern, since they are not targets of persistent data in the system.