On Thu, Feb 9, 2017 at 8:47 AM, Walter Dnes <waltd...@waltdnes.org> wrote:
> On Wed, Feb 08, 2017 at 08:27:41PM -0500, Rich Freeman wrote
>
>> As you can see, there is limited ability for even root to accidentally
>> mess something up.  If you bind-mount /dev in a regular chroot
>> (without a hardening technology on top) and something running as root
>> in the chroot tries to write to /dev/sda, then it will have the
>> obvious result.  Note that Linux containers are not yet 100% secure so
>> this should be viewed as a protection against accidental damage, not
>> as equivalent to a VM.  Non-root processes inside a container are
>> considered to be pretty secure I believe, and I believe root is
>> supposed to be OK if it is running in a container in a separate user
>> namespace (so it is non-root on the host).
>
>   If building Pale Moon inside a chroot as a regular user is a security
> issue...  then what can I say about doing personal 64-bit Pale Moon
> builds directly on my desktop (*NOT* chrooted) as a regular user???

I was speaking of containers in general, not the concerns specific to
building Pale Moon.

-- 
Rich

Reply via email to