On Wed, Jul 16, 2014 at 02:53:37PM -0300, Flavio Leitner wrote:
> On Wed, Jul 16, 2014 at 09:56:20AM -0700, Ben Pfaff wrote:
> > On Wed, Jul 16, 2014 at 10:39:17AM -0300, Flavio Leitner wrote:
> > There's more than one way to chroot.  Maybe Eric is thinking of a
> > model where one chroots to an empty directory, after opening all the
> > files that one needs.  But I don't think he really explained the
> > model.
> 
> That's true and it looks like ovsdb-server doesn't need to re-open it.
> 
> But that apparently won't work for vswitchd without breaking tap
> devices support.
> 
> I am by no means against the empty chroot idea.

vswitchd has multiple needs for special privileges.  It opens tap
devices and other network devices, it needs privileged access to
netlink sockets, it can modify network device IP addresses and the
routing table (admittedly not important features these days), it has
SSL private keys, etc.  And most of those can change at runtime when
the database gets updated.

A thought I've had about hardening ovs-vswitchd is to adopt an
OpenSSH-like privilege separation model, where a simple, separate
process with high privilege doles out restricted access to resources
as necessary to the main process over an RPC-based API.
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to