On Sun, Oct 3, 2010 at 9:01 PM, richard -rw- weinberger
<richard.weinber...@gmail.com> wrote:
> I'm using lxc to run a few virtual private servers.
> What capabilities are harmful and should be dropped using "lxc.cap.drop"?

Is my question too trivial or too stupid? ;)

Here what i know so far:

CAP_AUDIT_CONTROL:
  should be dropped
CAP_AUDIT_WRITE:
  should be dropped
CAP_CHOWN:
  is ok
CAP_DAC_OVERRIDE:
  is ok
CAP_DAC_READ_SEARCH
  is ok
CAP_FOWNER
  is ok
CAP_FSETID
  is ok
CAP_IPC_LOCK
  is ok
CAP_IPC_OWNER
  is ok
CAP_KILL
  is ok
CAP_LEASE
  is ok
CAP_LINUX_IMMUTABLE
  is ok
CAP_MAC_ADMIN
  should be dropped
CAP_MAC_OVERRIDE
  should be dropped
CAP_MKNOD
  should be dropped
CAP_NET_ADMIN
  is ok
CAP_NET_BIND_SERVICE
  is ok
CAP_NET_BROADCAST
  is ok
CAP_NET_RAW
  ok?
CAP_SETGID
  is ok
CAP_SETFCAP
  should be dropped
CAP_SETPCAP
  should be dropped
CAP_SETUID
  is ok
CAP_SYS_ADMIN
  should be dropped
CAP_SYS_BOOT
  should be dropped
CAP_SYS_CHROOT
  should be dropped
CAP_SYS_MODULE
  should be dropped
CAP_SYS_NICE
  should be dropped
CAP_SYS_PACCT
  should be dropped
CAP_SYS_PTRACE
  is ok
CAP_SYS_RAWIO
  should be dropped
CAP_SYS_RESOURCE
  should be dropped
CAP_SYS_TIME
  should be dropped
CAP_SYS_TTY_CONFIG
  should be dropped

Thanks!

-- 
Cheers,
//richard

------------------------------------------------------------------------------
Virtualization is moving to the mainstream and overtaking non-virtualized
environment for deploying applications. Does it make network security 
easier or more difficult to achieve? Read this whitepaper to separate the 
two and get a better understanding.
http://p.sf.net/sfu/hp-phase2-d2d
_______________________________________________
Lxc-users mailing list
Lxc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-users

Reply via email to