Re: lxc / vserver / openvz (was: systemd flamage)

2013-10-24 Thread Serge Hallyn
Quoting Adam Borowski (kilob...@angband.pl):
> On Thu, Oct 24, 2013 at 03:40:04PM +0200, Marco d'Itri wrote:
> > On Oct 24, Dmitrijs Ledkovs  wrote:
> > 
> > > What do you mean by "holding hostile root." ?
> > http://blog.bofh.it/debian/id_413
> > 
> > The missing parts (UID virtualization IIRC) are upstream now, and should 
> > be ready for jessie.
> 
> If I read Ubuntu documentation correctly, you also need a large complex
> apparmor policy to block sensitive /proc and /sys files from being messed
> with by guest systems.  vserver does this internally based on its system
> of capability bits.  It also censors misc syscalls; I can't seem to find
> this part being done by lxc.
> 
> > Until then if you do not trust containers then the best choice is to
> > use openvz with Parallel's 2.6.32 kernel.
> 
> As Ben Hutchings just told us, openvz has been merged upstream in 3.12. 

The openvz and container communities worked together on the kernel
features.  vzctl has been updated to use the kernel features that were
upstream-acceptable.

So 'openvz has been merged upstream' is technically false, as it implies
that the patches as they stood were merged.  But openvz developers
played a huge part in what made it upstream.

-serge


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131024165316.GB2226@ac100



Re: lxc / vserver / openvz (was: systemd flamage)

2013-10-24 Thread Adam Borowski
On Thu, Oct 24, 2013 at 03:40:04PM +0200, Marco d'Itri wrote:
> On Oct 24, Dmitrijs Ledkovs  wrote:
> 
> > What do you mean by "holding hostile root." ?
> http://blog.bofh.it/debian/id_413
> 
> The missing parts (UID virtualization IIRC) are upstream now, and should 
> be ready for jessie.

If I read Ubuntu documentation correctly, you also need a large complex
apparmor policy to block sensitive /proc and /sys files from being messed
with by guest systems.  vserver does this internally based on its system
of capability bits.  It also censors misc syscalls; I can't seem to find
this part being done by lxc.

> Until then if you do not trust containers then the best choice is to
> use openvz with Parallel's 2.6.32 kernel.

As Ben Hutchings just told us, openvz has been merged upstream in 3.12. 
Interestingly, that bit (CONFIG_USER_NS) just happens to be the same thing
the blog post you pointed to described as the main problem that needs to
be solved for lxc.

Let's see how complete this is in practice.  So far, vserver works for me
but upstreamed stuff has obvious upsides.

-- 
ᛊᚨᚾᛁᛏᚣ᛫ᛁᛊ᛫ᚠᛟᚱ᛫ᚦᛖ᛫ᚹᛖᚨᚲ


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131024144435.ga19...@angband.pl