On Sat, Nov 07, 2015 at 07:49:39AM +0000, Philip Whineray wrote: > Reading these files is impossible in an unprivileged user namespace, > interfering with various firewall tools. For instance, iptables-save > relies on reading /proc/net/ip_tables_names to dump only loaded tables. > > Hiding the contents from non-root users does not achieve anything > practical. Possible values are well-known and the specifics can > be inferred from a list of loaded modules on most systems. > > Signed-off-by: Philip Whineray <phil@xxxxxxxxxxx> > --- > An alternate might be to change the ownership of the files within the > namespace when it is created: > > https://lists.linuxcontainers.org/pipermail/lxc-users/2014-November/008110.html > > I do not see that there is much advantage to this, it just ties the > ability to read the files to the ability to create an unprivileged > namespace. So I understood this correctly, this approach would set the ownership of the /proc entry to the corresponding root uid mapping from the unpriviledged namespace, right? If so, I would prefer that approach. This is partially leaking the filtering policy to non-root users as it contains what modules are being used, so you can at least infer how complex your ruleset is. And I guess it will not be long time until someone else will follow up with a similar patch later on to expose the content of /proc/net/nf_conntrack to get this working on unpriviledged namespaces too. Thanks. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html