Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-26 Thread Serge Hallyn
> From: Serge Hallyn > Sent by: "lxc-users" > Date: 01/11/2016 23:36 > Subject: Re: [lxc-users] is starting unprivileged containers as root as > secure as running them as any other user? > > Quoting Carlos Alberto Lopez Perez (clo...@igalia.com): > > On 11/01/

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-24 Thread david . andel
2016 23:36 Subject: Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user? Quoting Carlos Alberto Lopez Perez (clo...@igalia.com): > On 11/01/16 23:13, Serge Hallyn wrote: > > Quoting david.an...@bli.uzh.ch (david.an...@bli.uzh.ch): &g

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-13 Thread Andrey Repin
Greetings, Saint Michael! > I noticed that lxc-attach does not run > source /etc/profile > and that is an issue since we set many environment variables and settings > that are needed for what comes next. > Is there a workaround? lxc-attach -n container -- sudo -i -- With best regards, Andr

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-13 Thread Saint Michael
I noticed that lxc-attach does not run source /etc/profile and that is an issue since we set many environment variables and settings that are needed for what comes next. Is there a workaround? On Wed, Jan 13, 2016 at 4:49 PM, Serge Hallyn wrote: > Quoting Carlos Alberto Lopez Perez (clo...@igali

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-13 Thread Serge Hallyn
Quoting Carlos Alberto Lopez Perez (clo...@igalia.com): > On 11/01/16 23:36, Serge Hallyn wrote: > > The lxc-attach weakness I mentioned does not apply to 'lxc exec', because > > lxd interposes a pty between your console and the container's. > > I understand that I could do the same (get a fresh P

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-13 Thread Carlos Alberto Lopez Perez
On 11/01/16 23:36, Serge Hallyn wrote: > The lxc-attach weakness I mentioned does not apply to 'lxc exec', because > lxd interposes a pty between your console and the container's. I understand that I could do the same (get a fresh PTY before attaching) with (for example): "screen lxc-attach ..." [

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-12 Thread Serge Hallyn
Quoting david.an...@bli.uzh.ch (david.an...@bli.uzh.ch): > So  if I understood correctly, this means that lxd could potentially suffer > from a weakness in 'lxc monitor' meaning that it is more secure to run > unprivileged containers using the low level lxc-... functions? I mentioned the lxc-mon

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-11 Thread david . andel
: Serge Hallyn Sent by: "lxc-users" Date: 01/11/2016 23:36 Subject: Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user? Quoting Carlos Alberto Lopez Perez (clo...@igalia.com): > On 11/01/16 23:13, Serge Hallyn wrote: > > Q

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-11 Thread Serge Hallyn
Quoting Carlos Alberto Lopez Perez (clo...@igalia.com): > On 11/01/16 23:13, Serge Hallyn wrote: > > Quoting david.an...@bli.uzh.ch (david.an...@bli.uzh.ch): > >> Hmm, this is interesting. > >> I am runnung my container from the unprivileged user 'lxduser' and yet: > >> > >> root@qumind:~# ps -ef

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-11 Thread Carlos Alberto Lopez Perez
On 11/01/16 23:13, Serge Hallyn wrote: > Quoting david.an...@bli.uzh.ch (david.an...@bli.uzh.ch): >> Hmm, this is interesting. >> I am runnung my container from the unprivileged user 'lxduser' and yet: >> >> root@qumind:~# ps -ef | grep '[l]xc monitor' >> root 7609 1 0 11:54 ?00:

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-11 Thread Serge Hallyn
Quoting david.an...@bli.uzh.ch (david.an...@bli.uzh.ch): > Hmm, this is interesting. > I am runnung my container from the unprivileged user 'lxduser' and yet: > > root@qumind:~# ps -ef | grep '[l]xc monitor' > root  7609 1  0 11:54 ?    00:00:00 [lxc monitor] > /var/lib/lxd/container

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-11 Thread david . andel
c-users" wrote: - To: LXC users mailing-list From: Serge Hallyn Sent by: "lxc-users" Date: 01/11/2016 19:00 Subject: Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user? Quoting Carlos Alberto Lopez Perez (clo...@igalia

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-11 Thread Serge Hallyn
Quoting Carlos Alberto Lopez Perez (clo...@igalia.com): > On 08/01/16 19:58, Serge Hallyn wrote: > > Quoting Carlos Alberto Lopez Perez (clo...@igalia.com): > >> Hi, > >> > >> > >> Suppose that we create an unprivileged container as root (using the > >> download template or manually converting it w

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-11 Thread Carlos Alberto Lopez Perez
On 08/01/16 19:58, Serge Hallyn wrote: > Quoting Carlos Alberto Lopez Perez (clo...@igalia.com): >> Hi, >> >> >> Suppose that we create an unprivileged container as root (using the >> download template or manually converting it with uidmapshift). >> >> Such container config will contain (for exampl

Re: [lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-08 Thread Serge Hallyn
Quoting Carlos Alberto Lopez Perez (clo...@igalia.com): > Hi, > > > Suppose that we create an unprivileged container as root (using the > download template or manually converting it with uidmapshift). > > Such container config will contain (for example) the following maps: > > lxc.id_map = u 0

[lxc-users] is starting unprivileged containers as root as secure as running them as any other user?

2016-01-08 Thread Carlos Alberto Lopez Perez
Hi, Suppose that we create an unprivileged container as root (using the download template or manually converting it with uidmapshift). Such container config will contain (for example) the following maps: lxc.id_map = u 0 10 65536 lxc.id_map = g 0 10 65536 And root would be also allowed