chore(sandbox): add iptables to base image for bypass diagnostics#36
Merged
johntmyers merged 1 commit intomainfrom Mar 15, 2026
Merged
Conversation
The sandbox supervisor will use iptables to install LOG + REJECT rules in the network namespace, providing immediate ECONNREFUSED (instead of 30s timeout) and structured diagnostic events when processes attempt direct connections that bypass the HTTP CONNECT proxy. Ref: NVIDIA/OpenShell#268
drew
approved these changes
Mar 15, 2026
This was referenced Mar 15, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Add
iptablespackage to the base sandbox image. The OpenShell sandbox supervisor will use this to install LOG + REJECT rules in the network namespace for proxy bypass detection.Related Issue
Ref: NVIDIA/OpenShell#268
Changes
sandboxes/base/Dockerfile: Addiptablesto the core system dependenciesapt-get installlineContext
When a sandbox process attempts a direct outbound connection that bypasses the HTTP CONNECT proxy (e.g., Node.js
fetch()withoutNODE_USE_ENV_PROXY=1), the connection currently hangs silently for 30+ seconds. Withiptablesavailable, the supervisor can:The supervisor already has
CAP_NET_ADMINand runs as root — this is purely a package availability change. Ifiptablesis not present, the feature degrades gracefully (warning logged, namespace still isolates via routing).Same pattern as
iproute2which is already a required dependency.Checklist