Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEk6tEyquWE2HS=Nrtzx4RS_GXRMNBBXVtac1dFP2Py17cN_MQ@mail.gmail.com>
Date: Wed, 25 Jan 2017 20:12:41 -0800
From: Jessica Frazelle <me@...sfraz.com>
To: Kees Cook <keescook@...omium.org>
Cc: "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>
Subject: Re: Introduction

On Wed, Jan 25, 2017, 11:37 Kees Cook <keescook@...omium.org> wrote:
>
> On Mon, Jan 23, 2017 at 4:06 PM, Jessica Frazelle <me@...sfraz.com> wrote:
> > I've been lurking on this mailing list for over a year now, so I think
> > I understand the gist of how it works. I am looking for some ways to
> > help out in my free time.
>
> Greetings! Thanks for saying "hi". :)
>
> > The subsystems I know the most about are cgroups and namespaces. I
> > previously was a maintainer of Docker (I added the seccomp integration
> > and maintained the AppArmor bits) and now I work on kubernetes.
> >
> > Let me know if you think there is a good place to start!
>
> I've mostly been trying to keep track of kernel self-protection TODO
> items, so I haven't been keeping too up to date on userspace-support
> things that the kernel provides. I know Solar has a list of things
> he'd like to see, and I know there was an earlier attempt at building
> an LSM to provide a more hardened chroot implementation (that Elena
> sent a version of last year).
>

I am familiar with the chroot LSM from GRSEC, I'm not sure if this
would help containers much mostly because we use pivot_root and a lot
of that functionality can be reproduced by either capabilities
dropping or seccomp. I'm guessing it has a use outside containers but
I'm not really sure what that may be other than ease of use of not
having to drop caps etc. I am more than willing to help make sure it
gets done in a way everyone wants if that's the case.

>
> Are there any gaps in existing cgroups/namespaces stuff that you'd
> like to see fixed? Or are there any areas of self-protection work that
> you find interesting and would want to learn more about?
>
> -Kees
>
> --
> Kees Cook
> Nexus Security

I would definitely like to help with some mechanisms that containers
and others could integrate to become more secure and I have some ideas
for this, but they are kind of a larger scale feature.

For now, I would love to help with whatever low hanging fruit no one
else wants to do but that might benefit some people. Then maybe once
I've been around the block enough times see if you all are interested
in something I have briefly thought of that maybe we could make
awesome together.

Honestly I'm open to working on whatever no one else wants too :)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.