Very clever engineers:
"We use seccomp to restrict the syscalls processes running in docker can make. Security first!"
Also very clever engineers:
*adds "seccomp(2)" and "prctl(2)" to list of allowed syscalls*
Very clever engineers:
"We use seccomp to restrict the syscalls processes running in docker can make. Security first!"
Also very clever engineers:
*adds "seccomp(2)" and "prctl(2)" to list of allowed syscalls*
@jschauma Shouldn't further seccomp(2) calls be more restrictive though?
At least that's how I read this paragraph in seccomp(2):
If prctl(2) or seccomp() is allowed by the attached filter,
further filters may be added. This will increase evaluation
time, but allows for further reduction of the attack surface
during execution of a thread.
@lanodan That seems to be the intent, but it's not clear to me what happens if a "further filter" conflicts with the existing filter. I.e., original filter denies syscallX, but the new filter explicitly allows syscallX.
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.