On Thu, Sep 7, 2017, at 02:51 PM, Ryan Barry wrote: > > I'd imagine the same. That said, oVirt Node is also not managed by > yum, and the specific request there was still to have separate > filesystems. The theory being that a runaway process or attacker > which/who fills one of the partitions can't lock out the entire system > or block logging of activities.> > In that sense, I suspect that most of the guidelines still apply.
Right, I'd agree. > > We did something similar in vintage oVirt Node, so I completely > understand -- we saw a large number of problems with some system > utilities not playing nice with bind mounts and redirection/symlinks > on a ro root, but that's a definite tangent. The only bind mount we have by default is var; the only side effect I can think of for this is https://github.com/ostreedev/ostree/issues/960 > >> In my testing, Atomic seems to only take ~3GB of the volume group > >> when installed, That's going to change; it already has for FAH (this is why I tend to useabbreviations like FAH, CAH, and RHELAH since there isn't just one "Atomic").See https://pagure.io/atomic-wg/issue/281 https://bugzilla.redhat.com/show_bug.cgi?id=1391725 > Updating the document is certainly a solution, though I expect that > /var/log and /var/log/audit will need to be separate volumes, at > least. I would also not be surprised to see that /opt and /home needed > to be also, so docker containers with VOLUME could not maliciously > fill those and simultaneously fill /var> > Is this something we can help with? I just tested this with Fedora-Atomic-ostree-x86_64-26-20170821.0.iso and it worked fine to make `/var/log` and `/var/log/audit` mount points. > > Outside of that, "full" STIG compliance (minus bootloader locking and > some other finicky bits -- cloud-init can handle most of the edge > cases for users who want the whole shebang) is another target. I've > seen some work on openscap for Atomic, but I haven't tried a run yet > to see what the status is... What do you mean by bootloader locking? Secure boot? Or having /boot be read-only? Something else Hmm, are you talking about cloud-init on bare metal? We were playing withthat but didn't really "productize" it.