[PATCH v2] xattr: Enable security.capability in user namespaces
Serge E. Hallyn
serge at hallyn.com
Thu Jul 13 21:17:44 UTC 2017
Quoting Eric W. Biederman (ebiederm at xmission.com):
> Stefan Berger <stefanb at linux.vnet.ibm.com> writes:
> If you don't care about the ownership of the files, and read only is
> acceptable, and you still don't want to give these executables
> capabilities in the initial user namespace. What you can do is
> make everything owned by some non-zero uid including the security
> capability. Call this non-zero uid image-root.
>
> When the container starts it creates two nested user namespaces first
> with image-root mapped to 0. Then with the containers choice of uid
> mapped to 0 image-root unmapped. This will ensure the capability
> attributes work for all containers that share that root image. And it
> ensures the file are read-only from the container.
>
> So I don't think there is ever a case where we would share a filesystem
> image where we would need to set multiple security attributes on a file.
Neat idea. In fact, you can take it a step further and still have the
files be owned by valid uids in the containers. The parent ns just
needs to have its *root* map to a common kuid not mapped into the child
namespaces, but the files can be owned by another kuid which *is* mapped
into the child containers.
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
More information about the Linux-security-module-archive
mailing list