On Wednesday 06 April 2011 16:08:18 Rob Landley wrote:
> On 04/06/2011 05:43 AM, Daniel Lezcano wrote:
> > On 03/22/2011 10:20 AM, Nathan McSween wrote:
> >> Can I get a quick rundown of what is implemented w.r.t  UID/GID
> >> containerization, is it safe yet to give containerized root to an
> >> everyday user without huge security issues?
> > 
> > Nope, it is not secure at all for a root user inside the container.
> 
> Any idea what's missing?

A root user can chroot out of the chrooted directory.
There were reports that /proc is not fully virtualized and changing some 
values there changes the values on the host machine and for all other 
containers.
A root user can create devices and access devices that should not be accessed 
by this container. Controling every device with control groups is not so easy.

Marian

> 
> Rob
> 
> ---------------------------------------------------------------------------
> --- Xperia(TM) PLAY
> It's a major breakthrough. An authentic gaming
> smartphone on the nation's most reliable network.
> And it wants your games.
> http://p.sf.net/sfu/verizon-sfdev
> _______________________________________________
> Lxc-devel mailing list
> Lxc-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/lxc-devel

-- 
Best regards,
Marian Marinov

Attachment: signature.asc
Description: This is a digitally signed message part.

------------------------------------------------------------------------------
Xperia(TM) PLAY
It's a major breakthrough. An authentic gaming
smartphone on the nation's most reliable network.
And it wants your games.
http://p.sf.net/sfu/verizon-sfdev
_______________________________________________
Lxc-devel mailing list
Lxc-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-devel

Reply via email to