Re: Limiting access to abstract unix domain sockets

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Quoting Alexander Larsson (alexl@xxxxxxxxxx):
> I'm working on using container technology to sandbox desktop
> applications, and I've run into an issue with abstract unix domain
> sockets. Generally unix domain sockets work fine in a container
> situation because they are naturally namespaced via the filesystem
> namespace.
> 
> However, abstract socket addresses are global to the *network*
> namespace. This means that if you need to share the host network
> namespace (typically so you have full ip networking access) you can't
> limit access to *any* service that listens to an abstract unix socket.
> 
> I don't particularly need to use abstract sockets, so it would be ok to
> just disallow its use in the container. I've looked at using seccomp for
> this, but it doesn't seem to help here, as it needs to dereference the
> socket address to tell if its abstract or not.
> 
> Does anyone have any idea how to do this?

You should be able to use recent apparmor or selinux.
_______________________________________________
Containers mailing list
Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx
https://lists.linuxfoundation.org/mailman/listinfo/containers




[Index of Archives]     [Cgroups]     [Netdev]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux