Re: Building a BSD-jail clone out of namespaces

2013-06-27 Thread Chris Webb
Chris Webb writes: > Prompted by the new userns support merged in the 3.8/3.9 kernels, I've been > playing with namespaces and trying to understand how I could use them to > build containers to replace some of my uses of qemu-kvm virtual machines. I now have most things working as I'd want and a

Re: Building a BSD-jail clone out of namespaces

2013-06-07 Thread Chris Webb
"Eric W. Biederman" writes: > It is a wider issue. Capabilities cover most of places in the kernel > where the kernel tests if you have privilege but there are other > filesystems like devtmpsfs, and the occasional silly piece of kernel > code that should be using capabilities but is not. Beyond

Re: Building a BSD-jail clone out of namespaces

2013-06-06 Thread Eric W. Biederman
Chris Webb writes: > "Eric W. Biederman" writes: > >> Hmm. I guess it depends on how your VM is reading them. If it is >> blocked based access to the filesystem you have a problem. If the VM >> is effectively NFS mounting the filesystem you can do all kinds of >> things. >> >> It is possibl

Re: Building a BSD-jail clone out of namespaces

2013-06-06 Thread Chris Webb
"Eric W. Biederman" writes: > Hmm. I guess it depends on how your VM is reading them. If it is > blocked based access to the filesystem you have a problem. If the VM > is effectively NFS mounting the filesystem you can do all kinds of > things. > > It is possible to just change the user name

Re: Building a BSD-jail clone out of namespaces

2013-06-06 Thread Eric W. Biederman
oping for in practice is to be able to create containers > whose access to its filesystem subtree is untranslated, i.e. uid/gid N in > the container maps to uid/gid N in a subdirectory of the filesystem, but > which is still isolated from the rest of the host filesystem and can't do > ext

Re: Building a BSD-jail clone out of namespaces

2013-06-06 Thread Eric W. Biederman
Chris Webb writes: > "Eric W. Biederman" writes: > >> That will work, but you really don't want to run with uid == 0 mapped to >> uid == 0. There are too many things in /proc and /sys and similar that >> grant access to uid == 0. > > Many thanks for the swift reply. If I map UID zero in the use

Re: Building a BSD-jail clone out of namespaces

2013-06-06 Thread Chris Webb
"Eric W. Biederman" writes: > That will work, but you really don't want to run with uid == 0 mapped to > uid == 0. There are too many things in /proc and /sys and similar that > grant access to uid == 0. Many thanks for the swift reply. If I map UID zero in the userns to a non-zero UID outside

Building a BSD-jail clone out of namespaces

2013-06-06 Thread Chris Webb
its filesystem subtree is untranslated, i.e. uid/gid N in the container maps to uid/gid N in a subdirectory of the filesystem, but which is still isolated from the rest of the host filesystem and can't do externally privileged things. This is pretty much what a BSD jail provides, for example.

Re: BSD jail

2005-08-15 Thread Joshua Hudson
> > To build a virtual network device requires code for the device, code > for routing the device > in the kernel, some way to tell the router that this machine is hosted > through the host > machine's ethernet card, and control of which processes use which > network devices. > I've bombed out. I

Re: BSD jail

2005-08-14 Thread Joshua Hudson
Quoting Serge E. Hallyn ([EMAIL PROTECTED]) >Quoting Joshua Hudson ([EMAIL PROTECTED]): > Why would you want a virtual network device implementation? The whole > >So that a jailed process can use the net but can't use your network >address (intercept ssh, imap/stunnel, etc). [snip] >But in the en

Re: BSD jail

2005-08-14 Thread Joshua Hudson
All right, I'll see what I can come up with. This is quite a tall order. 1. A mechanism for creating virtual network interfaces 2. A mechanism for restricting binding to certain network interfaces 3. A mechanism for binding certain network interfaces. 4. The jail code itself Much of the work is al

Re: BSD jail

2005-08-14 Thread Serge E. Hallyn
Quoting Joshua Hudson ([EMAIL PROTECTED]): > Why would you want a virtual network device implementation? The whole So that a jailed process can use the net but can't use your network address (intercept ssh, imap/stunnel, etc). > I do like the idea of patching in through LSM, however not everythin

Re: BSD jail

2005-08-13 Thread Joshua Hudson
On 8/13/05, Serge E. Hallyn <[EMAIL PROTECTED]> wrote: > The latest version (which is still quite old) is at > http://www.sf.net/projects/linuxjail and does have ipv6 support. The last > time I submitted it, Christoph had objected to the way the networking was > done in general. I've tried twice

Re: BSD jail

2005-08-13 Thread Serge E. Hallyn
Quoting Joshua Hudson ([EMAIL PROTECTED]): > I had been wanting this functionality myself, but for some reason it never > found > its way into the stock kernel. I looked around, started coding, > looked some more, > coded some more, looked some more until I found this: > > http://kerneltrap.org/

BSD jail

2005-08-12 Thread Joshua Hudson
y the BSD jail(2) call, but did it without breaking programs that depend on chroot escapes working (there are a few). I am currently about a third of the way to completion. This means that I will finish unless some other mechanism is provided before I do. I personally don't care if my patch i