On 2/12/24 19:15, Marius Schwarz wrote:
As this enables i.e. the hosting system of a vm or container, to track activity inside the 
container, trust is lost i.e. from customer to hoster. To be fair, you need to be root on the host 
to do this, but as it "wasn't possible before", and it is "now" ( out in a 
greater public ), it tends to create trust issues, just for being there*.

[...]

*) You may not have a clue, what security auditors tell you about "a vulnerability & 
it's just there, but inexploitable". I had a case 2 weeks ago, about a missing patch for 
the ssh-agent CVE vulnerability in fedora's openssh. Trust me, it will create trouble the 
more the topic is discussed in the pubic.

Auditors are constantly proposing disabling features and making things
inconvenient, undebuggable, inefficient and substantially annoying to operate.

They should instead learn some basic concepts of security.
For example: if you are running a process, even in a VM or container, you have
to trust the administrator of the host system. And that's it.

Regards.

--
   Roberto Ragusa    mail at robertoragusa.it
--
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to