Re: sandboxing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 02/02/2017 07:28 PM, Leonid Isaev wrote:
> I already described an approach when one always runs browsers, pdf readers,
> etc, inside an lxc container, as an unprivileged user. That container resides
> on a filesystem mounted with nosuid (so things like ping, su, sudo won't work),
> and has a locked root account. On top of that, it connects to a xephyr session
> running on the host, to avoid X11 sniffing attacks.
> 
> I have been using such setup on all my desktops for over a year now. The only
> way to break out of such a container is a local kernel privilege escalation. Of
> course, having *privileged* userns *might* help because inside container UID=0
> will map to smth like UID=123456 on the host, but this doesn't seem worth doing
> given all the ussues with userns.

This sounds cool. Do you happen to have written that up somewhere? :)

-- 
GPG fingerprint: 871F 1047 7DB3 DDED 5FC4 47B2 26C7 E577 EF96 7808

Attachment: signature.asc
Description: OpenPGP digital signature


[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux