[systemd-devel] What makes systemd-nspawn "not suitable for secure container setups"?

Daniel J Walsh dwalsh at redhat.com
Tue Apr 26 10:58:53 PDT 2011


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 04/26/2011 01:54 PM, Lennart Poettering wrote:
> On Mon, 25.04.11 20:51, microcai (microcai at fedoraproject.org) wrote:
> 
>> 于 2011年04月25日 20:43, Daniel J Walsh 写道:
>>> SELinux  would be a good start.
>>
>> No, root inside can still change SE-Linux policy.
> 
> No. The SELinux policy can forbid reloading the SELinux policy for
> certain users/processes.
> 
> SELinux should work fine to secure nspawn containers.
> 
> Lennart
> 
Right the idea would be to run all processes within te nspawn container
with the same process label, then only allow the access required for the
container.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk23B90ACgkQrlYvE4MpobNUXACgma9He3gGO6tZdv7WVwJaE0oe
mUsAoJ2GMaDRfP7hpflfS3Eqx3wEQKtM
=CqeA
-----END PGP SIGNATURE-----


More information about the systemd-devel mailing list