Hi there, > And if you have a bit of time I'd appreciate if you could explain why > should we elevate privileges for attaching to specific namespace? > Seems > to me that it is unrelated, since I should be able to enter NETWORK > ns > while not elevating cgroup, for example?
Since I added those options back in the day, a bit of a rationale: If I run lxc-attach without any further options, my expectation is that the process spawned sees nothing different compared to a process spawned from within the container. This is the case. Now if I specify that I only want to attach to the network namespace, then the spawned process is in a weird state: mount, pid, user, ipc and uts namespaces are all still those of the host, but the network namespace now is different. In some sense this already implies that the privileges of that process are 'elevated' compared to the privileges of a process in the container - it has access to the host in the other namespaces. For this reason, moving that process into the cgroup, dropping capabilities and loading the corresponding LSM context seem out of place, for this reason, I made -s imply -e. However, with your patch (which makes sense since my rewrite of the API), I think one could give the user the option of not evelating the other privileges. And while I do think that because of the above rationale having elevation being the default state when using -s, what do you think of the following proposal? - default => all privs dropped - only -s specified => no privs dropped - -e specified without argument => no privs dropped - -e NONE specified (regardless of -s) => all privs dropped - -e ALL specified (regardless of -s) => no privs dropped - -e A|B|C specified (regardless of -s) => A, B and C privs elevated, the rest dropped What do you (and Stephane and Serge) think? -- Christian ------------------------------------------------------------------------------ Shape the Mobile Experience: Free Subscription Software experts and developers: Be at the forefront of tech innovation. Intel(R) Software Adrenaline delivers strategic insight and game-changing conversations that shape the rapidly evolving mobile landscape. Sign up now. http://pubads.g.doubleclick.net/gampad/clk?id=63431311&iu=/4140/ostg.clktrk _______________________________________________ Lxc-devel mailing list Lxc-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/lxc-devel