Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Give container_t access to XFRM sockets #33

Merged
merged 1 commit into from
Mar 6, 2017

Conversation

joshwget
Copy link

@joshwget joshwget commented Mar 6, 2017

Unprivileged containers cannot currently access XFRM sockets. This is causing issues for Rancher users running on RHEL or CentOS with SELinux enabled due to Rancher's IPsec network implementation.

Unfortunately I'm not familiar enough with SELinux to determine whether unprivileged containers should have these permissions in general. I see the same permissions on similar socket types so it doesn't seem too unreasonable, but I'm still interested to hear feedback on this.

cc @ibuildthecloud

@rhatdan
Copy link
Member

rhatdan commented Mar 6, 2017

LGTM

@rhatdan rhatdan merged commit c1fd491 into containers:master Mar 6, 2017
@joshwget
Copy link
Author

joshwget commented Mar 6, 2017

@rhatdan Is it possible to backport this change to the RHEL SELinux policy?

@rhatdan
Copy link
Member

rhatdan commented Mar 6, 2017

Yes you will get it in 6 weeks. I am working on patches now.

@joshwget
Copy link
Author

joshwget commented Mar 6, 2017

Great, thanks @rhatdan!

@joshwget
Copy link
Author

@rhatdan Is the any way of finding out which releases have this patch and which don't?

@rhatdan
Copy link
Member

rhatdan commented Jul 11, 2017

Looks like container-selinux-2.14 or newer.

@joshwget
Copy link
Author

Thanks @rhatdan

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants