IIUC there are multiple ways to end up with a socket pair for which one end is in a user namespace and the other is outside of it. That means that SCM_CREDENTIALS can be used by a process in a userns to authenticate to a process outside. This is all well and good (and, as far as I know, correct), but I'm not sure this is always the desired behavior. In the context of a tool like Docker, it might be useful to have several user namespaces that have the *same* uids mapped. Nonetheless, if one of those namespaces is compromised, it probably shouldn't be permitted to attack things outside the user namespace (or in the host, if any interesting uids are mapped). Would it make sense to have an option to allow a user namespace to opt into different behavior so that its users show up as the invalid uid as seen from outside (as least for SCM_CREDENTIALS and SO_PEERCRED)? Implementing this might be awkward (ok, it might actively suck due to a possible need for reference counting), but I'm wondering if it's a good idea even in principle. --Andy _______________________________________________ Containers mailing list Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linuxfoundation.org/mailman/listinfo/containers