Re: New Blog on how SELinux blocked Docker container escape.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Tracy Reed <treed@xxxxxxxxxxxxxxx>:

> On Fri, Jan 13, 2017 at 11:48:20AM PST, Daniel J Walsh spake thusly:
>> http://rhelblog.redhat.com/2017/01/13/docker-0-day-stopped-cold-by-selinux/
>
> I have long been of the opinion that it is this sort of thing which best
> advocates the use of SELinux. We need more examples like this.

The threats are obvious to anyone by now. What SELinux needs is a clear
methodology. For example, this is *not* a methodology:

   <URL: https://wiki.gentoo.org/wiki/SELinux/Tutorials/Creating_your_o
   wn_policy_module_file>


As a software developer, what am I expect to do wrt SELinux? Should I
ship my product with an SELinux policy module? Or should I simply make
it SELinux agnostic and supply information for the sysadmin so they can
add a policy module for my product? If so, what information should I
provide?

As a sysadmin, should I accept RedHat's policy collection or come up
with my own? If I need another boolean not supplied by RedHat, what am I
to do? How do I make sure my policy is sound? How do I find out what
legitimate access I need to permit for a random service apart from
monitoring the audit log?

It's much easier to understand sandboxes, namespaces, containers,
virtual machines and such. What happens in Vegas stays in Vegas.

Take Daniel Walsh's link above. I didn't get any smarter reading it.
Look at <URL: https://bugzilla.redhat.com/show_bug.cgi?id=1409531#c8>:

   The proposed exploit scenario [...] is *not* possible under the
   default SELinux configuration.

Would it be possible under an SELinux configuration defined by me?


Marko
_______________________________________________
selinux mailing list -- selinux@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to selinux-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux