Source: proxychains Version: 3.1-7 Severity: important User: de...@kali.org Usertags: origin-kali
$ proxychains apt-get update [...] **** Seccomp prevented execution of syscall 0000000056 on architecture amd64 **** Reading package lists... Done E: Method https has died unexpectedly! E: Sub-process https returned an error code (31) According to the APT developers, this is due to the use of the clone() system call. They are unlikely to allow the use of this system call and it would be nice if proxychains could work without launching sub-processes. Apparently this would be the case of newer versions released on https://github.com/haad/proxychains (according to APT developer Julian Andres Klode <j...@debian.org> who made a quick test). Alternatively, proxychains should just ship an APT configuration snippet to let APT use the system call that proxychains needs. Julian is apparently considering to create specific configuration entries to allow system calls only when a specific string is found in LD_PRELOAD. Note that I'm forwarding this bug report from Kali: https://bugs.kali.org/view.php?id=4361 -- System Information: Debian Release: buster/sid APT prefers oldoldstable APT policy: (500, 'oldoldstable'), (500, 'unstable'), (500, 'testing'), (500, 'stable'), (500, 'oldstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.13.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)