* mounts & namespaces
@ 2009-11-18 9:48 Michael Tokarev
[not found] ` <4B03C2FF.5080004-Gdu+ltImwkhes2APU0mLOQ@public.gmane.org>
0 siblings, 1 reply; 3+ messages in thread
From: Michael Tokarev @ 2009-11-18 9:48 UTC (permalink / raw)
To: containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA,
lxc-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Hello.
I asked similar question on lxc-devel@ but got no reply. Since
the issue is in kernel entirely, I'm asking in containers@ now.
As a base, I used lxc utils.
First of all, I'm concerned about file namespace security in a
container. It is, basically, just a chroot(2), or at least it
looks like that to me. But as we know, root can break out of
chroot. Are there any protection methods that prevents this
break-out?
I see lxc-start performs one additional rbind-mount - whole root
filesystem of a container to a temporary directory (mktemp), and
uses that temp dir as root for the container. I wonder what it
is trying to achieve this way. Is it related to the first
question and prevents breaking out of chroot somehow?
On a similar note, can pivot_root be used there instead of a chroot?
But see below for this one.
Inside a container, /proc/mounts is a complete mess, since most
paths are not accessible (out of chroot). When using real
/etc/mtab things become much nicer, but mtab has been made a
link to /proc/mounts for a purpose.
So I wonder if we can clean that stuff up for real. I mean, not
/proc/mounts by itself but the namespace. For that, using
pivot_root instead of a chroot to keep other filesystems
available directly, and umount all of them which are not
useful. I understand it is not always possible (you can't
umount /oldroot/usr as long as /oldroot/usr/containerroot
is bind-mounted to /), but I think it's worth to try, at
least in cases where it is doable (maybe not for general
utils but in custom use-case).
But before trying, I want to understand the security
implicatins and the whole root barrier thing if any --
see my first question.
Thanks!
/mjt
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: mounts & namespaces
[not found] ` <4B03C2FF.5080004-Gdu+ltImwkhes2APU0mLOQ@public.gmane.org>
@ 2009-11-18 16:20 ` Serge E. Hallyn
2009-11-18 19:11 ` [lxc-devel] " Andrian Nord
1 sibling, 0 replies; 3+ messages in thread
From: Serge E. Hallyn @ 2009-11-18 16:20 UTC (permalink / raw)
To: Michael Tokarev
Cc: containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA,
lxc-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Quoting Michael Tokarev (mjt-XAri/EZa3C4vJsYlp49lxw@public.gmane.org):
> Hello.
>
> I asked similar question on lxc-devel@ but got no reply. Since
> the issue is in kernel entirely, I'm asking in containers@ now.
>
> As a base, I used lxc utils.
>
> First of all, I'm concerned about file namespace security in a
> container. It is, basically, just a chroot(2), or at least it
> looks like that to me. But as we know, root can break out of
> chroot. Are there any protection methods that prevents this
> break-out?
Not that I know of. I haven't looked at the relevant source in
lxc/ in awhile, and haven't tested, but you should easily be
able to verify by finding the chroot escape code and running it
from inside a container...
Of course you can use Smack or SELinux (or probably even and
Apparmor profile) to prevent it.
> I see lxc-start performs one additional rbind-mount - whole root
> filesystem of a container to a temporary directory (mktemp), and
> uses that temp dir as root for the container. I wonder what it
> is trying to achieve this way. Is it related to the first
> question and prevents breaking out of chroot somehow?
>
> On a similar note, can pivot_root be used there instead of a chroot?
> But see below for this one.
That is what libvirt does, for that very reason. However, that
can make startup a bit more fragile, due to requirements in
sys_pivot_root that mounts involved not be shared. It can be
worked around, but it starts to feel kludgy. In particular,
libvirt-lxc broke briefly because fedora was marking / as
MS_SHARED, while we were expecting / to be private (which is
the usual case).
So for the moment, I personally was quite happy that libvirt
and lxc were were each taking different approaches :)
> Inside a container, /proc/mounts is a complete mess, since most
> paths are not accessible (out of chroot). When using real
> /etc/mtab things become much nicer, but mtab has been made a
> link to /proc/mounts for a purpose.
>
> So I wonder if we can clean that stuff up for real. I mean, not
> /proc/mounts by itself but the namespace. For that, using
> pivot_root instead of a chroot to keep other filesystems
> available directly, and umount all of them which are not
> useful. I understand it is not always possible (you can't
> umount /oldroot/usr as long as /oldroot/usr/containerroot
> is bind-mounted to /), but I think it's worth to try, at
> least in cases where it is doable (maybe not for general
> utils but in custom use-case).
>
> But before trying, I want to understand the security
> implicatins and the whole root barrier thing if any --
> see my first question.
>
> Thanks!
>
> /mjt
> _______________________________________________
> Containers mailing list
> Containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org
> https://lists.linux-foundation.org/mailman/listinfo/containers
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [lxc-devel] mounts & namespaces
[not found] ` <4B03C2FF.5080004-Gdu+ltImwkhes2APU0mLOQ@public.gmane.org>
2009-11-18 16:20 ` Serge E. Hallyn
@ 2009-11-18 19:11 ` Andrian Nord
1 sibling, 0 replies; 3+ messages in thread
From: Andrian Nord @ 2009-11-18 19:11 UTC (permalink / raw)
To: lxc-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f,
containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA
On Wed, Nov 18, 2009 at 12:48:47PM +0300, Michael Tokarev wrote:
> chroot. Are there any protection methods that prevents this
> break-out?
Any advanced security system will protect you. For simple configuration
and without messing with policies etc, you may use kernel-only config of
GRsecurity, that have a bunch of patches for chroot protection.
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2009-11-18 19:11 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-11-18 9:48 mounts & namespaces Michael Tokarev
[not found] ` <4B03C2FF.5080004-Gdu+ltImwkhes2APU0mLOQ@public.gmane.org>
2009-11-18 16:20 ` Serge E. Hallyn
2009-11-18 19:11 ` [lxc-devel] " Andrian Nord
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.