I was wondering what is the best way to employ some basic security for lxc containers.

On the host, I'm running Ubuntu 14.04, lxc 1.0.7 with kernel 3.18.5.

1. root user in lxc containers is able to view dmesg, even with:

host# cat /proc/sys/kernel/dmesg_restrict
1


2. lxc containers are able to write to /proc/sysrq-trigger - so can technically poweroff the host:

guest# echo w > /proc/sysrq-trigger
guest# dmesg


3. /proc/kcore? And perhaps anything else which might need blocking so that the guest is not able to read data from the host/other guests?


--
Tomasz Chmielewski
http://www.sslrack.com

_______________________________________________
lxc-users mailing list
[email protected]
http://lists.linuxcontainers.org/listinfo/lxc-users

Reply via email to