[Devel] Re: LSM and Containers
Peter Dolding
oiaohm at gmail.com
Wed Oct 24 17:20:37 PDT 2007
On 10/25/07, Crispin Cowan <crispin at crispincowan.com> wrote:
> Peter Dolding wrote:
> > The other thing you have not though of and is critical. If LSM is the
> > same LSM across all containers. What happens if that is breached and
> > tripped to disable. You only want to loss one container to a breach
> > not the whole box and dice in one hit. Its also the reason why my
> > design does not have a direct link between controllers. No cascade
> > threw system to take box and dice.
> >
> Sorry, but I totally disagree.
>
> If you obtain enough privilege to disable the LSM in one container, you
> also obtain enough privilege to disable *other* LSMs that might be
> operating in different containers. This is a limitation of the
> Containers feature, not of LSM.
>
That is not a Container feature. If you have enough privilege does
not mean you can. Root user in a Container does not mean you can play
with other containers applications. There is a security split at the
container edge when doing Virtual Servers what by using one LSM you
are disregarding.
Simple point if one LSM is disabled in a container it can only get the
max rights of that Container. So cannot see the other LSM's on the
system bellow it. Reason also why in my model its the same layout if
there is 1 or 1000 stacked so attack cannot tell how deep they are in
and if there is anything to be gained by digging. You have to break
the Security Container as well to get higher. Of course breaking the
base LSM you would have problems the one with full powers of the
system and the right to kill and control the containers bellow it.
Most likely it would be wise to run that just for limited operations.
Really limited operations.
I think you need to go any play with Solaris some time what containers
can do is quite impressive. Right upto changing the syscalls and
device names inside them. Now its only going to get tricker if
someone brings in Freebsd and Solaris emulation containers into linux.
Yes this is still just using the Linux kernel. Because LSM's don't
exist on them you will want to plug in a module to suit the platform
contained inside the container. In particular something different to
process the security configs even if the same enforcement code is
used.
You are dealing with something far more powerful current model is not
going to fit. I look long term and I just cannot find what you are
doing is going to fit in anyway shape or form. Just different Linux
distros is the simple form of containers not is fully grown form.
This is the problem if you cannot do that future of containers will
have problems because LSM will be limiting its forms.
To rebuild a security framework takes time. Its time to pull head out
sand that containers are not simple thing that what has worked in past
with small alterations will work with it in future.
Containers are completely new system with completely new problems.
LSM's should not interfere with its development.
What you are doing is having each LSM create its own outer shield.
With its own weaknesses. Common Security Container makes only one
shield at edge of containers to maintain and look after. Does not
different weakness to track down and fix on a LSM by LSM base.
Peter Dolding
_______________________________________________
Containers mailing list
Containers at lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
More information about the Devel
mailing list