[Devel] Re: [PATCH user-cr] add -t option to mount new devpts
Serge E. Hallyn
serue at us.ibm.com
Fri Feb 12 09:05:28 PST 2010
Quoting Oren Laadan (orenl at cs.columbia.edu):
>
> Sorry for the late response ...
>
> Serge E. Hallyn wrote:
> >Trivial patch, and I'm not sure whether we want this or want to
> >do it this way. But it saves me having to do it during my restart.sh
> >wrapper shell-script.
>
> This looks useful.
>
> I wonder if it makes sense to generalize that to allow the user
> to request any mount (and multiple mounts), e.g.
> restart --mount="......" --mount="......." ...
Or just a --fstab=some_file option?
> With this switch, 'restart' will create a new mntns and do the
> mounts in it.
>
> We can then add shortcuts, like --mount-ptys.
>
> However, I'm concerned about the security implications: ideally
> 'restart' will be setuid executable, so it must be prudent in
> accepting such generic requests as 'mount'.
Hmm, we could use our own mount binary, which is willing to
mount things like devpts and proc as root (since that's completely
private) but otherwise runs the mounts as the original user? Eventually
do that on top of Miklos' unprivileged-mounts patchset, which will allow
bind mounts on top of dirs/files to which the user has write access. In
the meantime other mounts would only be allowed if the user was
originally root.
So basically our mount binary would be run with euid=0 and
ruid=suid=N where N is the original userid.
> This last argument is also valid if we stay with this patch,
> because it is racy (time of check to time of use).
Yeah I'm not sure we can solve this right now. We might be best
off saying that only ruid=0 can do the mounts, and mention something
about setuid-root restart.c can trust TPM-signed checkpoint images.
-serge
_______________________________________________
Containers mailing list
Containers at lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
More information about the Devel
mailing list