Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Explain reduced motivation to limit containers #161

Merged
merged 1 commit into from
Jun 3, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 16 additions & 2 deletions configfiles.rst
Original file line number Diff line number Diff line change
Expand Up @@ -219,7 +219,21 @@ means users can specify bind points, scratch and tmp locations.
Limiting Container Execution
============================

.. warning::
By default {Project} allows all users on a system to execute any container,
but there may be reasons that a system administrator desires to limit who
can do that.
The primary motivation of system administrators for this in the past was
to prevent untrusted users from potentially attacking the kernel via
setuid-mode mounting of containers using kernel drivers.
However this is no longer the default behavior of {Project};
user namespace mode never uses kernel drivers, and setuid-mode by
default does not use them if no container limits have been defined
(see ``allow setuid-mount squashfs`` below).
But there may be other reasons to limit execution, so {Project} provides
configuration options for this purpose, described here and in the
:ref:`Execution Control List <execution_control_list>` section below.

.. note::

The 'limit container' and 'allow container' directives are not effective if
unprivileged user namespaces are enabled. They are only effectively applied
Expand Down Expand Up @@ -717,7 +731,7 @@ SIF files by signing key is defined here. You can authorize the
containers by validating both the location of the SIF file in the
filesystem and by checking against a list of signing entities.

.. warning::
.. note::

The ECL is not effective if unprivileged user namespaces are enabled. It is
only effectively applied when {Project} is running
Expand Down
Loading