On Mon, Jan 16, 2017 at 7:59 PM,  <sf...@users.sourceforge.net> wrote:
>
> Arun Chandran:
>> No with 'sudo mount ..' the .wh.* files are created with label of the
>> user test not with the label of root.
>> [This is because objects gets label of the process; label of user test
>> is "k1"; sudo is not changing label]
>
> I see.
> It may be a very basic building block of security label NOT to use the
> effective uid.
>
> Back in our simple tests,
>
> cd layer1/
>> .wh..wh.aufs
> ln .wh..wh.aufs .wh.0.txt
>
> - by a normal user, .wh..wh.aufs will have access="k1".
> - sudo by a normal user, it will be access="k1" too.
> - by a plain superuser, it will be access="_".
> right?
>
Yes. Correct.

> And "sudo mount" sets access="k1" to .wh..wh.aufs.
> Good. It must be the way to go, isn't it?

"sudo mount .." gives correct labels. I can't use it because the
containers don't get sudo inside ; container might be running with the
lowest possible privileges.

I will be doing(as root).

1) Takes the request to load the docker app
2) Label the  all the layers in the app(files) with a smack label "kN"
3) All the layers are aufs mounted
4) Perform a label change of the .wh.* files from "_" to "kN"
5) Change the ownership of the .wh.* files from root to container UID
6) start the container

--Arun

------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today. http://sdm.link/xeonphi

Reply via email to