-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Securely create jails #57
Comments
@croquagei posted:
Requirement
Possible MitigationsA.) Directory mode |
I suggest The reason I suggest that over So
TLDR; This is over complicating the problem, just make each |
As I said in iocage/iocage#347, this mitigation comes with some serious repercussions that would require a whole redesign in iocage. It just so happens that kind of thing can happen here! We should move all jail configuration to a common dataset, The current tree looks similar to this:
It should look like this:
EDIT: I just realized that would introduce the fine-grain tuning issue that
|
@skarekrow I think you're over-complicating it. I don't need to mix secure and insecure jails on the same host, and I can't imagine why anyone would; an insecure jail is only safe when there are no untrusted users, in which case you don't also need secure jails. Setting I like the idea of not needing |
Unless we separate the configurations, we either have to trade the atomic snapshots, or the security of the jail. I'm not sure which is the better trade. |
Why is it necessary for an unprivileged user to be able to access the jail's config files? |
@rwestlund for unprivileged access to |
It does not make sense to me to give unprivileged users access to iocage while this access can be used to escalate privileges. I think it's reasonable to say that only root may access this directory. @skarekrow can you share a user scenario where it's mandatory to access jail properties from a non-privileged shell account? Although if there's a reason to grant access to unprivileged users users, I'd give a group access to /iocage and/or specific jails. This comes with bad security implications and should be mentioned in the documentation, but not be the default. |
@gronke I don't like the groups idea. I would much rather separate the configuration like I suggested. It's clean and to the user an invisible change unless they care about configuration location. I have a couple examples, so I'll repeat them again. |
On a more serious note: With separate configs, a Until we find a better solution, it looks like one of these three features has to go:
From where I stand, the third seems much less important than the other two. |
Yeah I've always viewed it as iocages best feature as well. I reverted the commit in iocage as I didn't feel people would appreciate having to run a tool as root for everything. If I'm wrong, I could certainly revert that. |
I'm in favor of dropping the ability to run iocage as unprivileged user. There was some discussion around an iocage daemon or proxy script, which seem more suitable to grant non-root users access to specific iocage properties and controls. Btw. why don't we just set 0700 on the top levle iocage dataset? |
iocage/iocage#347 was the original issue, iocage/iocage@54583ed commit that fixed it in iocage.
The text was updated successfully, but these errors were encountered: