Quoting Ferenc Wagner (wf...@niif.hu):
> Daniel Lezcano <daniel.lezc...@free.fr> writes:
> 
> > The lxc tools can be run as non-root with all the needed capabilities
> > set by lxc-setcap via the file capabilities. The command run by lxc
> > won't have these privileges of course.
> 
> I've always regarded such setups as a root shell by design, as it lets
> any user mount a filesystem containing a setuid root shell, then create
> another on some outside filesystem.
> Or is there anything in place to prevent that?

We really really need to get the user namespaces more advanced,
so that the container ends up with capabilities targeted to his
namespaces, but no capabilities on the host.

Eric's userid-namespaces-over-unix-sock patch is finally in
net-next, and can be seen as a step in the right direction.  (It
will prevent root in a container from being seen as privileged
by dbus/upstart)

-serge

------------------------------------------------------------------------------
This SF.net email is sponsored by Sprint
What will you do first with EVO, the first 4G phone?
Visit sprint.com/first -- http://p.sf.net/sfu/sprint-com-first
_______________________________________________
Lxc-devel mailing list
Lxc-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-devel

Reply via email to