-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow namespace changes in Janitor containers #232
Comments
Thanks for this feature request! I think that's because our Docker containers don't the This also prevents Firefox from running with a sandbox (which it apparently does in Debug mode, as @whimboo found out), and it also prevents us from using I don't think we'll want to add @notriddle what do you think? |
Neither Firefox sandboxing nor Chromium's namespace sandbox should need capabilities in the namespace they're launched in (nor any enclosing namespace), but they do need to be able to create new user namespaces. Normally this is allowed for unprivileged users, but there are concerns about it due to the possibility of exposing exploitable kernel bugs that unprivileged callers normally couldn't reach, so sandboxes usually block those system calls. That seems to be what's going on in Mozilla bug 1430756 — Docker's documentation mentions a seccomp-bpf policy that would do this. It also links to the policy, in a JSON format, which mentions allowing the syscalls in question in connection with |
Yeah, |
Thank you for these details! jessfraz/dockerfiles#65 (comment) prompted me to consult
Also,
I guess my questions here are:
[0] This Docker seccomp profile page linked by @jld mentions that for |
Random note, https://github.com/docker/docker-bench-security and Lynis can help us audit the security of our Docker configurations and dockerfiles. |
Other random note, this Docker docs page says:
Now we just need to know which capabilities we need to grant to our containers to support |
If docker image support namespace changes, I should be able to run Chrome with proper sandboxing.
Background thread:
The text was updated successfully, but these errors were encountered: