* [gentoo-user] /dev/shm in a Linux container @ 2015-09-27 14:38 lee 2015-09-27 15:06 ` Mike Gilbert 0 siblings, 1 reply; 3+ messages in thread From: lee @ 2015-09-27 14:38 UTC (permalink / raw To: gentoo-user Hi, when updating a guest in an LXC, emerging python pointed out a problem with a broken /dev/shm. So I found out how to mount /dev/shm in the container and updated. However, I'm wondering how secure that is, and I wonder if I should leave it mounted or disable the mount. It might be a very bad idea to leave it mounted, and there's probably good reasons not to have it mounted by default, yet I don't know if anything in the container might use or need this mount after updating. -- Again we must be afraid of speaking of daemons for fear that daemons might swallow us. Finally, this fear has become reasonable. ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [gentoo-user] /dev/shm in a Linux container 2015-09-27 14:38 [gentoo-user] /dev/shm in a Linux container lee @ 2015-09-27 15:06 ` Mike Gilbert 2015-09-27 15:35 ` Poison BL. 0 siblings, 1 reply; 3+ messages in thread From: Mike Gilbert @ 2015-09-27 15:06 UTC (permalink / raw To: gentoo-user On Sun, Sep 27, 2015 at 10:38 AM, lee <lee@yagibdah.de> wrote: > Hi, > > when updating a guest in an LXC, emerging python pointed out a problem > with a broken /dev/shm. So I found out how to mount /dev/shm in the > container and updated. > > However, I'm wondering how secure that is, and I wonder if I should > leave it mounted or disable the mount. It might be a very bad idea to > leave it mounted, and there's probably good reasons not to have it > mounted by default, yet I don't know if anything in the container might > use or need this mount after updating. There are a few glibc functions that require it: - Shared memory - Semaphores As a developer, I consider your system to be mis-configured if it is not mounted properly, and I would immediately close any related bug reports. I don't see how it could possibly be a security problem. ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [gentoo-user] /dev/shm in a Linux container 2015-09-27 15:06 ` Mike Gilbert @ 2015-09-27 15:35 ` Poison BL. 0 siblings, 0 replies; 3+ messages in thread From: Poison BL. @ 2015-09-27 15:35 UTC (permalink / raw To: gentoo-user On Sun, Sep 27, 2015 at 11:06 AM, Mike Gilbert <floppym@gentoo.org> wrote: > On Sun, Sep 27, 2015 at 10:38 AM, lee <lee@yagibdah.de> wrote: >> Hi, >> >> when updating a guest in an LXC, emerging python pointed out a problem >> with a broken /dev/shm. So I found out how to mount /dev/shm in the >> container and updated. >> >> However, I'm wondering how secure that is, and I wonder if I should >> leave it mounted or disable the mount. It might be a very bad idea to >> leave it mounted, and there's probably good reasons not to have it >> mounted by default, yet I don't know if anything in the container might >> use or need this mount after updating. > > There are a few glibc functions that require it: > > - Shared memory > - Semaphores > > As a developer, I consider your system to be mis-configured if it is > not mounted properly, and I would immediately close any related bug > reports. I don't see how it could possibly be a security problem. > By itself it's not, but there are a number of off the shelf exploits in other code (primarily webapps) that tend to depend on it being a trusty, reliable, writable path, even for processes running under accounts with very low privileges. Making it noexec narrows down the list a little, but it's far from foolproof. Avoiding it is less a proper security measure, and more a bandaid to try to cover real security issues you don't (yet) know you have, but the effectiveness is really up there with obfuscation (like making your lamp stack look like IIS to the casual passer-by). -- Poison [BLX] Joshua M. Murphy ^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2015-09-27 15:35 UTC | newest] Thread overview: 3+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2015-09-27 14:38 [gentoo-user] /dev/shm in a Linux container lee 2015-09-27 15:06 ` Mike Gilbert 2015-09-27 15:35 ` Poison BL.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox