Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

run dettrace without privileged flag under docker #219

Open
wangbj opened this issue Sep 4, 2019 · 3 comments
Open

run dettrace without privileged flag under docker #219

wangbj opened this issue Sep 4, 2019 · 3 comments

Comments

@wangbj
Copy link
Collaborator

wangbj commented Sep 4, 2019

when run under docker, dettrace requires --priviledged flag passed to docker, it would be nice to remove this flag, or a list of functions who depends on --priviledged flag.

@wangbj
Copy link
Collaborator Author

wangbj commented Sep 5, 2019

docker filter certain syscalls such as personality, seccomp, ptrace..., see:

https://docs.docker.com/engine/security/seccomp/#significant-syscalls-blocked-by-the-default-profile

@rrnewton
Copy link
Member

rrnewton commented Sep 5, 2019

Elsewhere we discussed 8 orthogonal aspects of determinization/sanboxing. Maybe these can be a checklist to ask ourselves "does sandboxing this feature require --priviliged?".

(1) host file system: mount all or part of it (related: optional chroot)
(2) environment variables: add all or part of it
(3) special paths (/proc, /dev, etc)
(4) ASLR
(5) user-namespace
(6) PID namespace
(7) mount namespace -- re: ability to bindmount
(8) network — allow or disallow (or, record in the case of fingerprinter)

@rrnewton
Copy link
Member

@wangbj - seccomp is actually not on that list of disabled by default, right? But we're still pretty screwed by ptrace being disabled.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants