Quoting jeetu.gol...@gmail.com (jeetu.gol...@gmail.com):
> Hi Serge,
> 
> Thanks for taking the time  :)
> 
> >
> > Note you can of course just add the network lines to this file by
> > yourself, you don't have to create a whole new container right now  :)
> >
> 
> > No, the automatic use of a system lxc.conf is just an ubuntu thing.  Can't
> > really go upstream because it's pretty distro-specific.
> 
> That explains that :)
> 
> >From my limited knowledge though it seems that lxc.cgroup.devices.deny
> = a would deny access to all devices and shouldn't this therefore
> isolate network interfaces in the host from the container? As I

the devices cgroup only prevents access to block and character device
nodes in the filesystem.  (i.e. /dev/loop0 which is block maj 7 minor 0)

> mentioned in spite of this setting my container can see and operate on
> interfaces in the host. Explicitly adding the network stanza to config
> as recommended solves that however I'm wondering if this is deliberate
> by design and if so the rationale behind this - just trying to get a
> deeper understanding of design considerations of lxc.
> 
> I'm also concerned that similarly there could be other devices /
> resources not automatically isolated and that require explicity
> configuration.

Plenty.  Containers are not root-secure.  See
https://wiki.ubuntu.com/LxcSecurity for starters.

-serge

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Lxc-users mailing list
Lxc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-users

Reply via email to