Home » Mailing lists » Devel » [patch -mm 00/17] new namespaces and related syscalls
Re: [patch -mm 08/17] nsproxy: add hashtable [message #16930 is a reply to message #16923] |
Mon, 11 December 2006 20:03 |
serue
Messages: 750 Registered: February 2006
|
Senior Member |
|
|
Quoting Eric W. Biederman (ebiederm@xmission.com):
> "Serge E. Hallyn" <serue@us.ibm.com> writes:
>
> > Quoting Serge E. Hallyn (serue@us.ibm.com):
> >> Quoting Eric W. Biederman (ebiederm@xmission.com):
> >> > Herbert Poetzl <herbert@13thfloor.at> writes:
> >> > >> Beyond that yes it seems to make sense to let user space
> >> > >> maintain any mapping of containers to ids.
> >> > >
> >> > > I agree with that, but we need something to move
> >> > > around between the various spaces ...
> >> >
> >> > If you have CAP_SYS_PTRACE or you have a child process
> >> > in a container you can create another with ptrace.
> >> >
> >> > Now I don't mind optimizing that case, with something like
> >> > the proposed bind_ns syscall. But we need to be darn certain
> >> > why it is safe, and does not change the security model that
> >> > we currently have.
> >>
> >> Sigh, and that's going to have to be a discussion per namespace.
> >
> > Well, assuming that we're using pids as identifiers, that means
> > we can only enter decendent namespaces, which means 'we' must
> > have created them. So anything we could do by entering the ns,
> > we could have done by creating it as well, right?
>
> It isn't strict descendents who we can see. i.e. init can create
> the thing, and we could have just logged into the network but init
> and us still share the same pid namespace.
>
> But yes it would be we can only enter descendent namespaces, for
> some definition of enter.
>
> There are two issues.
> 1) We may have a namespace we want to create and then remove the ability
> for the sysadmin to fiddle with, so it can play with encrypted data or
> something like that safely. Not quite unix but it is certainly worth
> considering.
Yeah, that occurred to me, but it doesn't seem like we can possibly make
sufficient guarantees to the client to make this worthwhile.
I'd love to be wrong about that, but if nothing else we can't prove to
the client that they're running on an unhacked host. So the host admin
will always have to be trusted.
> 2) When we only partially enter a namespace it is very easy for additional
> properties to enter that namespace. For example we enter the pid
> namespace and the mount namespace, but keep our current working directory
> in the previous namespace. Then a process in the restricted namespace
> can get out by cd into /proc/<?>/cwd.
Yup, entering existing namespaces should be all-or-nothing.
> If someones permissions to various objects does not depend on the namespace
> they are in quite possibly this is a non-issue. If we actually depend on
> the isolation to keep things secure enter is a setup for a first rate escape.
I don't believe the isolation can be effective between two namespaces
where one is an ancestor of another. It can be so long as one isn't
the ancestor of another, but then we're not allowing either to enter
the other namespace. So it's not a problem.
The bind_ns() proposed by Cedric is stricter, only allowing nsid 0 to
switch namespaces. So it may be overly restrictive, and does introduce
a new global namespace, but it is safe.
-serge
_______________________________________________
Containers mailing list
Containers@lists.osdl.org
https://lists.osdl.org/mailman/listinfo/containers
|
|
|
|
|
[patch -mm 00/17] new namespaces and related syscalls
|
|
|
[patch -mm 01/17] net namespace: empty framework
|
|
|
[patch -mm 02/17] user namespace: add the framework
|
|
|
[patch -mm 03/17] namespace : export unshare of namespace and fs_struct
|
|
|
[patch -mm 04/17] nsproxy: externalizes exit_task_namespaces
|
|
|
Re: [patch -mm 04/17] nsproxy: externalizes exit_task_namespaces
By: ebiederm on Fri, 08 December 2006 20:16
|
|
|
Re: [patch -mm 04/17] nsproxy: externalizes exit_task_namespaces
|
|
|
[patch -mm 05/17] ipc namespace : externalizes unshare_ipcs
|
|
|
Re: [patch -mm 05/17] ipc namespace : externalizes unshare_ipcs
|
|
|
Re: [patch -mm 05/17] ipc namespace : externalizes unshare_ipcs
|
|
|
[patch -mm 06/17] nsproxy: add extern to nsproxy functions
|
|
|
[patch -mm 07/17] nsproxy: make put_nsproxy an extern
|
|
|
[patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: ebiederm on Fri, 08 December 2006 19:30
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: serue on Fri, 08 December 2006 19:53
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: ebiederm on Fri, 08 December 2006 20:57
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: ebiederm on Sat, 09 December 2006 07:54
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: serue on Mon, 11 December 2006 15:29
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: serue on Mon, 11 December 2006 15:56
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: ebiederm on Mon, 11 December 2006 19:35
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: serue on Mon, 11 December 2006 20:03
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: ebiederm on Mon, 11 December 2006 20:34
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: serue on Mon, 11 December 2006 22:01
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: serue on Wed, 20 December 2006 06:12
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: serue on Mon, 11 December 2006 22:18
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: ebiederm on Tue, 12 December 2006 03:28
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: serue on Tue, 12 December 2006 15:29
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: serue on Tue, 12 December 2006 15:45
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: dev on Tue, 12 December 2006 08:43
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: ebiederm on Tue, 12 December 2006 07:52
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: ebiederm on Tue, 12 December 2006 08:37
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: ebiederm on Tue, 12 December 2006 08:57
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: ebiederm on Wed, 13 December 2006 18:53
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
|
|
|
Re: [patch -mm 08/17] nsproxy: add hashtable
By: ebiederm on Thu, 14 December 2006 21:08
|
|
|
[patch -mm 09/17] nsproxy: add namespace flags
|
|
|
Re: [patch -mm 09/17] nsproxy: add namespace flags
|
|
|
Re: [patch -mm 09/17] nsproxy: add namespace flags
|
|
|
Re: [patch -mm 09/17] nsproxy: add namespace flags
By: ebiederm on Fri, 08 December 2006 19:40
|
|
|
Re: [patch -mm 09/17] nsproxy: add namespace flags
|
|
|
Re: [patch -mm 09/17] nsproxy: add namespace flags
By: ebiederm on Mon, 11 December 2006 20:02
|
|
|
[patch -mm 10/17] nsproxy: add unshare_ns and bind_ns syscalls
|
|
|
Re: [patch -mm 10/17] nsproxy: add unshare_ns and bind_ns syscalls
By: ebiederm on Fri, 08 December 2006 19:26
|
|
|
Re: [patch -mm 10/17] nsproxy: add unshare_ns and bind_ns syscalls
|
|
|
Re: [patch -mm 10/17] nsproxy: add unshare_ns and bind_ns syscalls
|
|
|
Re: [patch -mm 10/17] nsproxy: add unshare_ns and bind_ns syscalls
|
|
|
Re: [patch -mm 10/17] nsproxy: add unshare_ns and bind_ns syscalls
By: ebiederm on Sat, 09 December 2006 07:40
|
|
|
Re: [patch -mm 10/17] nsproxy: add unshare_ns and bind_ns syscalls
|
|
|
[patch -mm 11/17] user namespace: add user_namespace ptr to vfsmount
|
|
|
Re: [patch -mm 11/17] user namespace: add user_namespace ptr to vfsmount
By: serue on Tue, 05 December 2006 18:27
|
|
|
[patch -mm 12/17] user namespace: hook permission
|
|
|
[patch -mm 13/17] user namespace: implement shared mounts
|
|
|
[patch -mm 14/17] user namespace: maintain user ns for priv_userns mounts to vfsmount
|
|
|
[patch -mm 15/17] pid namespace: add unshare
|
|
|
[patch -mm 16/17] net namespace: add unshare
|
|
|
[patch -mm 17/17] user namespace: add unshare
|
Goto Forum:
Current Time: Sat Nov 09 05:22:00 GMT 2024
Total time taken to generate the page: 0.03314 seconds
|