Sandboxing for containers

Registered by Serge Hallyn

Even when user namespaces are fully implemented, there remains the concern that containers share an OS with the host, and may be able to exploit syscall vulnerabilities (in particular) to gain access to and privilege in the host.

Historically, relatively new syscalls in particular, have ended up with vulnerabilities which a container would be able to exploit.

It would be nice if we could deny a container from using certain system calls, perhaps by a method analogous to seccomp. http://lwn.net/Articles/332438/ described plans for such, and a suggestion to combine seccomp with ftrace instead. http://code.google.com/p/seccompsandbox/ describes what google ended up using for chrome on linux instead. http://www.cl.cam.ac.uk/research/security/capsicum/ describes the approach used on freebsd. http://git.chromium.org/gitweb/?p=kernel-capsicum.git;a=summary is a port to linux. These are very useful for sandboxes in general, but not ideal for this lxc concern.

This blueprint, then, is for following, helping and testing, or initiating the seccomp+ftrace approach.

Blueprint information

Status:
Complete
Approver:
Dave Walker
Priority:
High
Drafter:
None
Direction:
Approved
Assignee:
Serge Hallyn
Definition:
Approved
Series goal:
Accepted for precise
Implementation:
Implemented
Milestone target:
milestone icon ubuntu-12.04
Started by
Robbie Williamson
Completed by
Robbie Williamson

Related branches

Sprints

Whiteboard

Status: not yet started
The seccomp2 patch in the oneiric kernel supports execve, but is not yet upstream. There is a minijail0 POC general sandbox tool which works on precise and could be packaged. LXC support for seccomp2 should be possible.

Work Items:
[jjohansen] Get seccomp2 into ubuntu kernel or ppa for testing: DONE
[serge-hallyn] First review of new approach: DONE
[serge-hallyn] Lkml review of new approach: DONE
[serge-hallyn] Package minijail0: POSTPONED
[serge-hallyn] Send POC of lxc integration to lxc-dev: POSTPONED
[serge-hallyn] Write testcases for lxc seccomp2 integration: POSTPONED

Comments:
A patch with a new approach is being worked on. As such, the
previously planned work items do not make sense for this cycle
and have been marked POSTPONED.

(?)

Work Items

Dependency tree

* Blueprints in grey have been implemented.