-
Notifications
You must be signed in to change notification settings - Fork 18
Compartment user sessions using pam_namespace #28
Conversation
fc1a24b to
50a7c88
Compare
|
Ping? |
|
I don't understand the consequences of this enough; it's new to me :) Hoping someone else might know more. @deleriux2 ping? |
|
2 notes before this gets applied:
|
|
Also, ping @lrvick |
|
No-one interected in reviewing that? :( FYI, the same config is currently deployed at the local hackerspace, and works great. |
|
If no one else replies; I say give it a try and see if it works out :P |
|
+1 to tias On Sat, Oct 31, 2015 at 11:17 PM, daurnimator notifications@github.com
Lance R. Vick Cell - 407.283.7596 |
|
tias == Try it and see ? Anyhow, I guess I will try it on |
|
If you want, I think we can set up a temporary server for testing this. |
|
Yeah do1 is probably fine for the scope of this, then use admin tools to On Fri, Nov 6, 2015 at 7:22 AM, Charles Heywood notifications@github.com
Lance R. Vick Cell - 407.283.7596 |
e39d5a3 to
cf77c71
Compare
|
This shoud also poly-instanciate |
f69087b to
8c9bd36
Compare
|
Also, let's merge that once emergency root access is sorted out. |
fc18ecf to
fab447e
Compare
|
Emergency root access is happening now: hashbang/admin-tools#12 and #62 |
- the unmnt_remnt option makes sudo switch to the destination user's namespace;
- {/var,}/tmp and /run/{shm,lock} are poly-instantiated on a per-user basis
root gets to escape this and see all instances
fab447e to
3caffbf
Compare
On stock Debian, /bin/sh is dash, which does not have a -p option. See upstream bug #624842: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624842
We are not using this, since we do not polyinstanciate homedirs. Even if we did, users getting fresh homedirs and losing their config all the time isn't the desired behaviour.
It is based on what systemd allows with PrivateDevices=yes. What could possibly go wrong? :> The /run/shm polyinstance is dropped, since /run/shm is a symlink to /dev/shm by default.
3caffbf to
4f35020
Compare
|
Ok, now that emergency root access is sorted out, I will TIAS this on |
Compartment user sessions using pam_namespace
|
Deployed and tested on That can be deployed to the other boxes by running sync.yml, then terminating all user session (but you might as well just reboot and make us sure nothing is still using the old (vulnerable) libc). |
|
For the record: deployed everywhere. |
Compartment user sessions using pam_namespace
Compartment user sessions using pam_namespace
{/var,}/tmpand/run/{shm,lock}are poly-instantiated on a per-user basis;root gets to escape this and see all instances.
I have been fairly conservative, so this shouldn't break anything.
In particular, I would like (in a future patch) to:
/run/user, and possibly more things in/run, as many services get rather dirty in there;have a namespaced/devwhich only allows access to pseudo-devices (null,zero,random, ...);systemd.exec'sProtectSystem=full);Also, I discussed with @lrvick the possibility of using network namespacing to give each user their own IPv6 (though this requires getting IPv6 connectivity first ...).