Re: Containers Digest, Vol 169, Issue 34

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



El vie., 28 de agosto de 2020 10:47 a. m., <
containers-request@xxxxxxxxxxxxxxxxxxxxxxxxxx> escribió:

> Send Containers mailing list submissions to
>         containers@xxxxxxxxxxxxxxxxxxxxxxxxxx
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         https://lists.linuxfoundation.org/mailman/listinfo/containers
> or, via email, send a message with subject or body 'help' to
>         containers-request@xxxxxxxxxxxxxxxxxxxxxxxxxx
>
> You can reach the person managing the list at
>         containers-owner@xxxxxxxxxxxxxxxxxxxxxxxxxx
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Containers digest..."
>
>
> Today's Topics:
>
>    1. Use cases for multiple uid mapping? (Eric W. Biederman)
>    2. Re: Overlayfs @Plumbers (Eric W. Biederman)
>    3. Re: Use cases for multiple uid mapping? (St?phane Graber)
>    4. Re: Overlayfs @Plumbers (Aleksa Sarai)
>    5. Re: Use cases for multiple uid mapping? (Sargun Dhillon)
>    6. HELLO (WIDOW COLON DENISE.G)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Fri, 28 Aug 2020 10:17:16 -0500
> From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
> To: Linux Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
> Cc: Christian Brauner <christian.brauner@xxxxxxxxxx>
> Subject: Use cases for multiple uid mapping?
> Message-ID: <87zh6eiyv7.fsf@xxxxxxxxxxxxxxxxxxxxx>
> Content-Type: text/plain
>
>
> We had a discussion in the hackroom at LPC talking about use cases for
> a shiftfs style setup where there are different mappings of uids to
> disk.
>
> In the discussion we had a couple of ideas of kernel developments
> we should look at that address some of these.
>
> - Fix rlimits in user namespaces (This potentially allows multiple
>   containers to run with the same userids simplifying the mapping
>   problem).
>
> - Look at extending kuid_t to 64bits and using the highbits to
>   implement uids that are private to user namespaces and don't
>   map out.
>
> - Look at ways for allowing setgroups unprivileged.
>
>
> Together this has the potential that the existing uid & gid mappings
> will be able to function the same as the proposed fusid mappings. Fingers
> crossed.
>
>
> I had some problems with audio and a lot of people were talking
> quickly.  So I did not manage to capture everyone's use cases.   And I
> definitely was not able to see how everyone's use cases interacted with
> the changes we are looking at.
>
> I know for certain I missed Serge's usecase (apologies).
>
> Can people follow up to this and report their use cases?
>
> There are some real challenges and I would like to see if we
> can solve them, while avoiding scary problems like changing
> uids on write.
>
> Eric
>
>
>
>
>
>
>
>
>
>
>
>
> ------------------------------
>
> Message: 2
> Date: Fri, 28 Aug 2020 10:33:16 -0500
> From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
> To: Amir Goldstein <amir73il@xxxxxxxxx>
> Cc: Linux Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>,
>         overlayfs <linux-unionfs@xxxxxxxxxxxxxxx>
> Subject: Re: Overlayfs @Plumbers
> Message-ID: <87tuwmiy4j.fsf@xxxxxxxxxxxxxxxxxxxxx>
> Content-Type: text/plain
>
> Amir Goldstein <amir73il@xxxxxxxxx> writes:
>
> > Hi Guys,
> >
> > It's been nice to virtually meet with you yesterday.
> > Some of you wanted to follow up on overlayfs related issues.
> >
> > If you want to discuss, try to find me in one of the
> > https://meet.2020.linuxplumbersconf.org/hackrooms
> > today between 16:00-17:00 UTC
> > (No need to enter the room to see who's inside)
> >
> > If those times do not work for you, contact me and we can try
> > to schedule another time.
>
> Did this conversation wind up happening?  Do we need to reschedule?
>
> Eric
>
>
> ------------------------------
>
> Message: 3
> Date: Fri, 28 Aug 2020 11:55:44 -0400
> From: St?phane Graber <stgraber@xxxxxxxxxxxx>
> To: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
> Cc: Linux Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>,
>         Christian Brauner <christian.brauner@xxxxxxxxxx>
> Subject: Re: Use cases for multiple uid mapping?
> Message-ID:
>         <CA+enf=
> u7nenUStSs-UHzQouPVaJSHnEOcoQ_ecvhkrjLuxLkeA@xxxxxxxxxxxxxx>
> Content-Type: text/plain; charset="UTF-8"
>
> On Fri, Aug 28, 2020 at 11:21 AM Eric W. Biederman
> <ebiederm@xxxxxxxxxxxx> wrote:
> >
> >
> > We had a discussion in the hackroom at LPC talking about use cases for
> > a shiftfs style setup where there are different mappings of uids to
> > disk.
> >
> > In the discussion we had a couple of ideas of kernel developments
> > we should look at that address some of these.
> >
> > - Fix rlimits in user namespaces (This potentially allows multiple
> >   containers to run with the same userids simplifying the mapping
> >   problem).
> >
> > - Look at extending kuid_t to 64bits and using the highbits to
> >   implement uids that are private to user namespaces and don't
> >   map out.
> >
> > - Look at ways for allowing setgroups unprivileged.
> >
> >
> > Together this has the potential that the existing uid & gid mappings
> > will be able to function the same as the proposed fusid mappings.
> Fingers crossed.
> >
> >
> > I had some problems with audio and a lot of people were talking
> > quickly.  So I did not manage to capture everyone's use cases.   And I
> > definitely was not able to see how everyone's use cases interacted with
> > the changes we are looking at.
> >
> > I know for certain I missed Serge's usecase (apologies).
> >
> > Can people follow up to this and report their use cases?
> >
> > There are some real challenges and I would like to see if we
> > can solve them, while avoiding scary problems like changing
> > uids on write.
> >
> > Eric
>
> Hi Eric,
>
> It was great to have you and everyone else participate in that session.
> There was indeed a lot covered in there and a lot of use cases we'll
> have to keep in mind!
>
> The main outcomes we captured I believe were:
>  - Fixing rlimits in user namespaces such that one namespace cannot
> affect another
>  - Consider switching the kernel uid/git types to 64bit, allowing for
> a hidden 32bit identifier and fully usable 32bit uid/gid range for the
> container
>  - Find a way to allow setgroups() in a user namespace while keeping
> in mind the case of groups used for negative access control
>  - Add optional enforcement that overflow uid/gid as set through
> sysctl cannot be used as regular uid/gid on the system
>
> Christian is working on a comprehensive summary of the session based
> on the shared notes document we circulated at the beginning of the
> session which will try to separate the different topics and cover use
> cases and potential solutions for each as we discussed in the BoF.
>
> We'll make sure that everyone who attended the BoF gets CCed on that,
> on top of the usual mailing-lists so that should any of the use raised
> use cases have been missed in the notes, those folks can raise them
> again so we don't end up missing anything :)
>
> St?phane
>
>
> ------------------------------
>
> Message: 4
> Date: Sat, 29 Aug 2020 01:58:49 +1000
> From: Aleksa Sarai <asarai@xxxxxxx>
> To: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
> Cc: Linux Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>,
>         overlayfs <linux-unionfs@xxxxxxxxxxxxxxx>
> Subject: Re: Overlayfs @Plumbers
> Message-ID: <20200828155849.k46uk3x63aio3g3o@xxxxxxxxxxxxxxxxxxxx>
> Content-Type: text/plain; charset="us-ascii"
>
> On 2020-08-28, Eric W. Biederman <ebiederm@xxxxxxxxxxxx> wrote:
> > Amir Goldstein <amir73il@xxxxxxxxx> writes:
> >
> > > Hi Guys,
> > >
> > > It's been nice to virtually meet with you yesterday.
> > > Some of you wanted to follow up on overlayfs related issues.
> > >
> > > If you want to discuss, try to find me in one of the
> > > https://meet.2020.linuxplumbersconf.org/hackrooms
> > > today between 16:00-17:00 UTC
> > > (No need to enter the room to see who's inside)
> > >
> > > If those times do not work for you, contact me and we can try
> > > to schedule another time.
> >
> > Did this conversation wind up happening?  Do we need to reschedule?
>
> This conversation already happened in a Hackroom on Tuesday. I'm not
> sure if the Hackrooms will have their recordings published, so maybe
> Amir can post any of the takeaways we had?
>
> --
> Aleksa Sarai
> Senior Software Engineer (Containers)
> SUSE Linux GmbH
> <https://www.cyphar.com/>
> -------------- next part --------------
> A non-text attachment was scrubbed...
> Name: signature.asc
> Type: application/pgp-signature
> Size: 833 bytes
> Desc: not available
> URL: <
> http://lists.linuxfoundation.org/pipermail/containers/attachments/20200829/ee719859/attachment-0001.sig
> >
>
> ------------------------------
>
> Message: 5
> Date: Fri, 28 Aug 2020 10:03:45 -0700
> From: Sargun Dhillon <sargun@xxxxxxxxx>
> To: St?phane Graber <stgraber@xxxxxxxxxxxx>
> Cc: Linux Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>, "Eric W.
>         Biederman" <ebiederm@xxxxxxxxxxxx>, Christian Brauner
>         <christian.brauner@xxxxxxxxxx>
> Subject: Re: Use cases for multiple uid mapping?
> Message-ID:
>         <
> CAMp4zn_Z6GVPvx6cuRhsJAfOhez-V-V-io0NXuzaQrWSgqadYw@xxxxxxxxxxxxxx>
> Content-Type: text/plain; charset="UTF-8"
>
> On Fri, Aug 28, 2020 at 8:56 AM St?phane Graber via Containers
> <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx> wrote:
> >
> > On Fri, Aug 28, 2020 at 11:21 AM Eric W. Biederman
> > <ebiederm@xxxxxxxxxxxx> wrote:
> > >
> > >
> > > We had a discussion in the hackroom at LPC talking about use cases for
> > > a shiftfs style setup where there are different mappings of uids to
> > > disk.
> > >
> > > In the discussion we had a couple of ideas of kernel developments
> > > we should look at that address some of these.
> > >
> > > - Fix rlimits in user namespaces (This potentially allows multiple
> > >   containers to run with the same userids simplifying the mapping
> > >   problem).
> > >
> > > - Look at extending kuid_t to 64bits and using the highbits to
> > >   implement uids that are private to user namespaces and don't
> > >   map out.
> > >
> > > - Look at ways for allowing setgroups unprivileged.
> > >
> > >
> > > Together this has the potential that the existing uid & gid mappings
> > > will be able to function the same as the proposed fusid mappings.
> Fingers crossed.
> > >
> > >
> > > I had some problems with audio and a lot of people were talking
> > > quickly.  So I did not manage to capture everyone's use cases.   And I
> > > definitely was not able to see how everyone's use cases interacted with
> > > the changes we are looking at.
> > >
> > > I know for certain I missed Serge's usecase (apologies).
> > >
> > > Can people follow up to this and report their use cases?
> > >
> > > There are some real challenges and I would like to see if we
> > > can solve them, while avoiding scary problems like changing
> > > uids on write.
> > >
> > > Eric
> >
> > Hi Eric,
> >
> > It was great to have you and everyone else participate in that session.
> > There was indeed a lot covered in there and a lot of use cases we'll
> > have to keep in mind!
> >
> > The main outcomes we captured I believe were:
> >  - Fixing rlimits in user namespaces such that one namespace cannot
> > affect another
> >  - Consider switching the kernel uid/git types to 64bit, allowing for
> > a hidden 32bit identifier and fully usable 32bit uid/gid range for the
> > container
> Seconding this. We run into a lot of problems with high UIDs. Some
> systems think that uid 2**31-1 (I think it's 2**31-1) is their version of
> 'nobody'. Being able to have 64-bit UIDs would solve this.
>
> Also making sure this works with NFSv4 (both ID mapped, and non-
> ID mapped) is very important to us. It's fine if the UID / GID is just
> "passthrough", and we don't need different mappings between
> different filesystems in NFS (for now). We would like to be able
> to be able to run idmapper in the user / pid / net namespace of
> the container.
>
> >  - Find a way to allow setgroups() in a user namespace while keeping
> > in mind the case of groups used for negative access control
> >  - Add optional enforcement that overflow uid/gid as set through
> > sysctl cannot be used as regular uid/gid on the system
> >
> > Christian is working on a comprehensive summary of the session based
> > on the shared notes document we circulated at the beginning of the
> > session which will try to separate the different topics and cover use
> > cases and potential solutions for each as we discussed in the BoF.
> >
> > We'll make sure that everyone who attended the BoF gets CCed on that,
> > on top of the usual mailing-lists so that should any of the use raised
> > use cases have been missed in the notes, those folks can raise them
> > again so we don't end up missing anything :)
> >
> > St?phane
> > _______________________________________________
> > Containers mailing list
> > Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx
> > https://lists.linuxfoundation.org/mailman/listinfo/containers
>
>
> ------------------------------
>
> Message: 6
> Date: 20 Aug 2020 19:07:50 -0700
> From: WIDOW COLON DENISE.G <epaper@xxxxxxxxxxxxxxxx>,
>         =?UTF-8?B?wqA=?=@osuosl.org
> To: containers@xxxxxxxxxxxxxxxxxxxxxxxxxx
> Subject: HELLO
> Message-ID: <20200820190749.BE3DDB5A761D02BF@xxxxxxxxxxxxxxxx>
> Content-Type: text/plain;       charset="utf-8"
>
> Hello,
>
> Thank you for the attention you give to my dearest wish, I would
> like you to know that I did not get the wrong person by sending
> you this message. My ardent wish has always been to meet an
> anonymous natural person so that the latter leads social actions
> through a foundation. However, I would understand your amazement
> at how I do it. My name is COLON DENISE .G born on July 27, 1942,
> of French nationality and I am currently under medical
> observation in a hospital in PORTUGAL. I had to contact you in
> this way because I wish to make a donation of ? 1,500,000 to help
> people in need, make poor families, orphans happy, help young
> entrepreneurs who are at fundraising to grow their business
> sectors ... those around you. My professional life has been a
> long, calm river, especially since I have always lived far from
> my country. First in Kuwait, where I worked in the petroleum
> sector for two years. Then I went to the Republic of Benin (2001)
> where I set up several companies (real estate, industrial ...).
> It is in this country so welcoming that I experienced real
> happiness, that of a marriage with a Canadian who also worked in
> this country. Unfortunately we were not fortunate enough to have
> children. After five years of living together, my husband died
> after a long illness. So I was left alone again with a butler at
> my disposal and a dog until this cancer came to limit my life. I
> have been fighting this disease for almost four years and
> medicine can do nothing more following the results of medical
> examinations which indicate that my days are numbered, following
> the confessions of my doctor. I had blocked this large sum in one
> of the Benin Banks for a construction project. I will be grateful
> to entrust this money to you so that my donation project
> succeeds. I take you accept this, because it is a gift from a
> dying woman and that without asking anything in return. Please
> reply to me as soon as possible at my email address, which is:
> colondeniseglmv@xxxxxxxxxx
>
> WIDOW COLON DENISE .G
>
>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> Containers mailing list
> Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx
> https://lists.linuxfoundation.org/mailman/listinfo/containers
>
> ------------------------------
>
> End of Containers Digest, Vol 169, Issue 34
> *******************************************
>
_______________________________________________
Containers mailing list
Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx
https://lists.linuxfoundation.org/mailman/listinfo/containers




[Index of Archives]     [Cgroups]     [Netdev]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux