-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Filter dangerous tools and add an unsafe keyword to enable them #46
Comments
"dangerous tools" <-- should it be about specific type of system calls and not the tool itself? |
Yes and no. So yes we should filter system calls that are considered dangerous. But we can't allow somebody to just run unshare for example using podtracer. That would be a disaster. It's an easy way to become root on any namespace. And we need to actually list the tools we support and test. And possibly let a --unsafe flag to allow experimental stuff with a policy to disable the flag on production environments. |
|
Those two points are crucial for this issue. Thanks for bringing it here. This way we can have it documented. So to address them here is somehow what we discussed last meeting:
a) We need to come up with a list of tools that we want to provide on podtracer's image. Initially only networking tools but extensible to other disciplines in the future. b) Tested and safe means we know it's going to work (because it's been tested) and there is a very specific troubleshooting purpose for that tool in the sense that it's not generic like the unshare command for example that can be run with -r and create a new container running as root based on podtracer's container in that case. So we don't want certain tools to be available because snoopy-operator's ability to run safely relies on this and we would like non-admin users to be able to troubleshoot their applications without super privileges. And that's another point that still needs careful consideration. That said we may have tools available for experimental use that we can enable using a --unsafe keyword. But those will be compiled with podtracer image. c) On another note: another issue may come up to allow the user to provide his own image with his own tooling. But that is another step and certainly not the scope here.
|
No description provided.
The text was updated successfully, but these errors were encountered: