Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Specify the recommended defaults for security #319

Merged
merged 1 commit into from
Oct 9, 2020

Conversation

rhatdan
Copy link
Member

@rhatdan rhatdan commented Oct 2, 2020

In Fedora Rawhide, I have eliminated some CAPABILITIES from the
default list to make containers more secure. The containers.conf
should be listed here as well. The default list in code is still
the Docker defaults, but I have eliminated three from the default
list

AUDIT_WRITE, MKNOD, NET_RAW

In Fedora 33 we have eliminated just MKNOD and NET_RAW.

Signed-off-by: Daniel J Walsh dwalsh@redhat.com

@rhatdan
Copy link
Member Author

rhatdan commented Oct 6, 2020

@containers/podman-maintainers PTAL

In Fedora Rawhide, I have eliminated some CAPABILITIES from the
default list to make containers more secure. The containers.conf
should be listed here as well.  The default list in code is still
the Docker defaults, but I have eliminated three from the default
list

AUDIT_WRITE, MKNOD, NET_RAW

In Fedora 33 we have eliminated just MKNOD and NET_RAW.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
@rhatdan
Copy link
Member Author

rhatdan commented Oct 8, 2020

@containers/podman-maintainers PTAL again.

Copy link
Member

@saschagrunert saschagrunert left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM 👍

@openshift-ci-robot
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: rhatdan, saschagrunert

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link
Member

@vrothberg vrothberg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@rhatdan @baude ... can we revive the discussion how to actually test these changes? I still think we should use this containers.conf in Podman's CI to have some kind of security net. But maybe there's a better way?

@rhatdan
Copy link
Member Author

rhatdan commented Oct 9, 2020

@vrothberg Yes step one is to get this file merged into common, then we can setup tests to use this containers.conf by default in the vendored subdir or podman.

This means we would at least realize breakage in the podman tests when a new version of containers/common got vendored in.

@vrothberg
Copy link
Member

/lgtm

@openshift-merge-robot openshift-merge-robot merged commit 5bd988b into containers:master Oct 9, 2020
cevich added a commit to cevich/buildah that referenced this pull request Jan 7, 2021
This test fails after updating to new VM images which include
containers/common#319

Work around the problem by adding in the capabilities expected
to be present.  Thanks to @edsantiago and @giuseppe for the fix.

Signed-off-by: Chris Evich <cevich@redhat.com>
cevich added a commit to cevich/buildah that referenced this pull request Jan 7, 2021
This test fails after updating to new VM images which include
containers/common#319

Work around the problem by adding in the capabilities expected
to be present.  Thanks to @edsantiago and @giuseppe for the fix.

Signed-off-by: Chris Evich <cevich@redhat.com>
cevich added a commit to cevich/buildah that referenced this pull request Jan 11, 2021
This test fails after updating to new VM images which include
containers/common#319

Work around the problem by adding in the capabilities expected
to be present.  Thanks to @edsantiago and @giuseppe for the fix.

Signed-off-by: Chris Evich <cevich@redhat.com>
cevich added a commit to cevich/buildah that referenced this pull request Jan 12, 2021
This test fails after updating to new VM images which include
containers/common#319

Work around the problem by adding in the capabilities expected
to be present.  Thanks to @edsantiago and @giuseppe for the fix.

Signed-off-by: Chris Evich <cevich@redhat.com>
cevich added a commit to cevich/buildah that referenced this pull request Jan 12, 2021
This test fails after updating to new VM images which include
containers/common#319

Work around the problem by adding in the capabilities expected
to be present.  Thanks to @edsantiago and @giuseppe for the fix.

Signed-off-by: Chris Evich <cevich@redhat.com>
cevich added a commit to cevich/buildah that referenced this pull request Feb 15, 2021
This test fails after updating to new VM images which include
containers/common#319

Work around the problem by adding in the capabilities expected
to be present.  Thanks to @edsantiago and @giuseppe for the fix.

Signed-off-by: Chris Evich <cevich@redhat.com>
M1cha pushed a commit to M1cha/common that referenced this pull request Dec 20, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants