Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RFC: Constrain driver processes with cgroups #54

Open
kimburgess opened this issue Nov 7, 2020 · 1 comment
Open

RFC: Constrain driver processes with cgroups #54

kimburgess opened this issue Nov 7, 2020 · 1 comment
Labels
type: discussion Issue that can be resolved with discussion type: enhancement new feature or request type: security Issue related to Security

Comments

@kimburgess
Copy link
Contributor

Given drivers hold the potential to introduce potentially untrusted code, it may be worth adding some more guard rails around their operation. A tool that seems like an obvious choice is cgroups.

At a minimum, this would allow resources available to driver processes to be limited and divided as appropriate. Network traffic could also be tagged to enable external filtering and prevent loopback access to internal services.

What I'm not sure of is if these are assignable when already inside a container without needing privileged access to the host, which is undesirable and in some environments potentially not possible at all. I'll check this next week unless anyone else can clarify first.

If this can be used, can anyone think of reasons why it should be implemented?

@jeremyw24 jeremyw24 added type: enhancement new feature or request and removed enhancement labels Mar 15, 2021
@jeremyw24 jeremyw24 added the type: security Issue related to Security label Mar 25, 2021
@caspiano caspiano added the type: discussion Issue that can be resolved with discussion label Mar 31, 2021
@kimburgess
Copy link
Contributor Author

Reason for implementation: PlaceOS/driver#72.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type: discussion Issue that can be resolved with discussion type: enhancement new feature or request type: security Issue related to Security
Projects
None yet
Development

No branches or pull requests

3 participants