|
Message-ID: <20111122201007.GA21722@sergelap> Date: Tue, 22 Nov 2011 14:10:07 -0600 From: Serge Hallyn <serge.hallyn@...onical.com> To: Vasiliy Kulikov <segoon@...nwall.com> Cc: Kees Cook <keescook@...omium.org>, linux-kernel@...r.kernel.org, linux-security-module@...r.kernel.org, kernel-hardening@...ts.openwall.com, "Serge E. Hallyn" <serge@...lyn.com> Subject: Re: [RFC] Make Yama pid_ns aware Quoting Vasiliy Kulikov (segoon@...nwall.com): > Hi Serge, > > On Tue, Nov 22, 2011 at 12:13 -0600, Serge Hallyn wrote: > > Quoting Vasiliy Kulikov (segoon@...nwall.com): > > > As Yama's sysctls are about defining a security policy for the system, > > > it is reasonable to define it per container in case of LXC containers > > > (or out-of-tree alternatives like OpenVZ). In my opinion they belong > > > to pid namespace. With per-pid_ns sysctls it is possible to create > > > multiple containers with different ptrace, /tmp, etc. policies. > > > > tying the ptrace policy to pidns makes some sense, but is it definately > > what we want? > > > > Is the idea that the container should never be able to bypass the > > restrictions, or should root in the container eventually be able to > > bypass it as he can on the host? > > In-container root already has CAP_SYS_PTRACE, so he can avoid the check > even if Yama's ptrace policy is enabled. Well, not necessarily :) But in general. But still, is turning this on and off per-container, and leaving it off on the host, something people will reasonably want to do? I'm just wondering whether adding the extra data on the pidns is worth it. It's fine if it is, but I'm having a hard time imagining someone using it like that. thanks, -serge
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.