So far, I drop these capabilities in my containers to enhance security:

lxc.cap.drop = mac_override
lxc.cap.drop = sys_module
lxc.cap.drop = sys_boot
lxc.cap.drop = sys_admin
lxc.cap.drop = sys_time

What about sys_rawio?
The problem is, this capability allows access to /proc/kcore
Can I drop it or is it necessary for important programs?

-- 
Ullrich Horlacher              Informationssysteme und Serverbetrieb
Rechenzentrum IZUS/TIK         E-Mail: horlac...@tik.uni-stuttgart.de
Universitaet Stuttgart         Tel:    ++49-711-68565868
Allmandring 30a                Fax:    ++49-711-682357
70550 Stuttgart (Germany)      WWW:    http://www.tik.uni-stuttgart.de/
REF:<20131024071900.gd12...@rus.uni-stuttgart.de>

------------------------------------------------------------------------------
October Webinars: Code for Performance
Free Intel webinars can help you accelerate application performance.
Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from 
the latest Intel processors and coprocessors. See abstracts and register >
http://pubads.g.doubleclick.net/gampad/clk?id=60135991&iu=/4140/ostg.clktrk
_______________________________________________
Lxc-users mailing list
Lxc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-users

Reply via email to