Rebrand the project from Fence to Greywall, the sandboxing layer of the GreyHaven platform. This updates: - Go module path to gitea.app.monadical.io/monadical/greywall - Binary name, CLI help text, and all usage examples - Config paths (~/.config/greywall/greywall.json), env vars (GREYWALL_*) - Log prefixes ([greywall:*]), temp file prefixes (greywall-*) - All documentation, scripts, CI workflows, and example files - README rewritten with GreyHaven branding and Fence attribution Directory/file renames: cmd/fence → cmd/greywall, pkg/fence → pkg/greywall, docs/why-fence.md → docs/why-greywall.md, example JSON files, and banner.
5.0 KiB
Troubleshooting
Nested Sandboxing Not Supported
Greywall cannot run inside another sandbox that uses the same underlying technology.
macOS (Seatbelt): If you try to run greywall inside an existing sandbox-exec sandbox (e.g., Nix's Darwin build sandbox), you'll see:
Sandbox: sandbox-exec(...) deny(1) forbidden-sandbox-reinit
This is a macOS kernel limitation - nested Seatbelt sandboxes are not allowed. There is no workaround.
Linux (Landlock): Landlock supports stacking (nested restrictions), but greywall's test binaries cannot use the Landlock wrapper (see Testing docs).
"bwrap: loopback: Failed RTM_NEWADDR: Operation not permitted" (Linux)
This error occurs when greywall tries to create a network namespace but the environment lacks the CAP_NET_ADMIN capability. This is common in:
- Docker containers (unless run with
--privilegedor--cap-add=NET_ADMIN) - GitHub Actions and other CI runners
- Ubuntu 24.04+ with restrictive AppArmor policies
- Kubernetes pods without elevated security contexts
What happens now:
Greywall automatically detects this limitation and falls back to running without network namespace isolation. The sandbox still provides:
- Filesystem restrictions (read-only root, allowWrite paths)
- PID namespace isolation
- Seccomp syscall filtering
- Landlock (if available)
What's reduced:
- Network isolation via namespace is skipped
- The proxy-based domain filtering still works (via
HTTP_PROXY/HTTPS_PROXY) - But programs that bypass proxy env vars won't be network-isolated
To check if your environment supports network namespaces:
greywall --linux-features
Look for "Network namespace (--unshare-net): true/false"
Solutions if you need full network isolation:
-
Run with elevated privileges:
sudo greywall <command> -
In Docker, add capability:
docker run --cap-add=NET_ADMIN ... -
In GitHub Actions, this typically isn't possible without self-hosted runners with elevated permissions.
-
On Ubuntu 24.04+, you may need to modify AppArmor profiles (see Ubuntu bug 2069526).
"bwrap: setting up uid map: Permission denied" (Linux)
This error occurs when bwrap cannot create user namespaces. This typically happens when:
- The
uidmappackage is not installed /etc/subuidand/etc/subgidare not configured for your user- bwrap is not setuid
Quick fix (if you have root access):
# Install uidmap
sudo apt install uidmap # Debian/Ubuntu
# Make bwrap setuid
sudo chmod u+s $(which bwrap)
Or configure subuid/subgid for your user:
echo "$(whoami):100000:65536" | sudo tee -a /etc/subuid
echo "$(whoami):100000:65536" | sudo tee -a /etc/subgid
On most systems with package-manager-installed bwrap, this error shouldn't occur. If it does, your system may have non-standard security policies.
"curl: (56) CONNECT tunnel failed, response 403"
This usually means:
- the process tried to reach a domain that is not allowed, and
- the request went through greywall's HTTP proxy, which returned
403.
Fix:
- Run with monitor mode to see what was blocked:
greywall -m <command>
- Add the required destination(s) to
network.allowedDomains.
"It works outside greywall but not inside"
Start with:
greywall -m <command>to see what's being deniedgreywall -d <command>to see full proxy and sandbox detail
Common causes:
- Missing
allowedDomains - A tool attempting direct sockets that don't respect proxy environment variables
- Localhost outbound blocked (DB/cache on
127.0.0.1) - Writes blocked (you didn't include a directory in
filesystem.allowWrite)
Node.js HTTP(S) doesn't use proxy env vars by default
Node's built-in http/https modules ignore HTTP_PROXY/HTTPS_PROXY.
If your Node code makes outbound HTTP(S) requests, use a proxy-aware client.
For example with undici:
import { ProxyAgent, fetch } from "undici";
const proxyUrl = process.env.HTTPS_PROXY;
const response = await fetch(url, {
dispatcher: new ProxyAgent(proxyUrl),
});
Greywall's OS-level sandbox should still block direct connections; the above makes your requests go through the filtering proxy so allowlisting works as intended.
Local services (Redis/Postgres/etc.) fail inside the sandbox
If your process needs to connect to localhost services, set:
{
"network": { "allowLocalOutbound": true }
}
If you're running a server inside the sandbox that must accept connections:
- set
network.allowLocalBinding: true(to bind) - use
-p <port>(to expose inbound port(s))
"Permission denied" on file writes
Writes are denied by default.
- Add the minimum required writable directories to
filesystem.allowWrite. - Protect sensitive targets with
filesystem.denyWrite(and note greywall protects some targets regardless).
Example:
{
"filesystem": {
"allowWrite": [".", "/tmp"],
"denyWrite": [".env", "*.key"]
}
}