Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add --security-opt=no-new-privileges to chronos.service #213

Conversation

anshupande
Copy link
Contributor

@anshupande anshupande commented May 19, 2016

A process can set the no_new_priv bit in the kernel. It persists across fork, clone and execve. The no_new_priv bit ensures that the process or its children processes do not gain any additional privileges via suid or sgid bits. This way a lot of dangerous operations become a lot less dangerous because there is no possibility of subverting privileged binaries. no_new_priv prevents LSMs like SELinux from transitioning to process labels that have access not allowed to the current process.

@anshupande
Copy link
Contributor Author

do not merge. still testing

@anshupande
Copy link
Contributor Author

I checked by opening a issue with Docker and here is the response : This feature was not in docker 1.9, I think it was only added in 1.11. moby/moby#22862

@anshupande
Copy link
Contributor Author

Closing this and will rework on this once we are on 1.11

@anshupande anshupande closed this May 20, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant