[
https://issues.apache.org/jira/browse/HDDS-1712?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16886343#comment-16886343
]
Eric Yang commented on HDDS-1712:
---------------------------------
{quote}See my comment in the pull request, this is an independent problem. Even
without sudo I can do the same (use ubuntu image + mount host path){quote}
Please demonstrate. If -u ${UID}:${GID} is enforced, and UID does not have
sudo access, and host mounting paths are permissively allowed? docker -u flag
and mounting path can be audited before source code is committed. By
implementing a few simple procedures, this will make Ozone docker image more
secure and less abuse on root power. We should not provide false impression to
user that we are starting with -u hadoop, then go behind user's back to run
sudo curl install. Otherwise, it breaks user's trust to use Ozone-runner image.
> Remove sudo access from Ozone docker image
> ------------------------------------------
>
> Key: HDDS-1712
> URL: https://issues.apache.org/jira/browse/HDDS-1712
> Project: Hadoop Distributed Data Store
> Issue Type: Bug
> Reporter: Eric Yang
> Assignee: Eric Yang
> Priority: Major
> Labels: pull-request-available
> Attachments: HDDS-1712.001.patch
>
> Time Spent: 0.5h
> Remaining Estimate: 0h
>
> Ozone docker image is given unlimited sudo access to hadoop user. This poses
> a security risk where host level user uid 1000 can attach a debugger to the
> container process to obtain root access.
--
This message was sent by Atlassian JIRA
(v7.6.14#76016)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]