Skip to content

20160510 CoreOSFest 7

20160510_CoreOSFest-7

Keynote: Security in systemd

1 - Intro

Sandbox everything
* Not only containers, system services too

What diff ‘System service’ vs ‘Container’ ?

Systemd-nspawn
* User namespace that work

2 - Sec features

PrivateTmp=yes|no
* Private instance of /tmp and /var/tmp
* Lifecycle is bound to service runtimes

JoinsNamespaceOf=
* Allow IPC between services that use some UNIX sockets in /tmp

CapabilityBoundingSet=
* FlagBits to give very specific permissions (Example, NTP priviliges to set Host clock)

AmbiantCapabilities=
* Heritage of capabilities

PrivateDevices=yes|no
* Shared devices are /dev/null and so on that are part of Unix API

ProtectHome=yes|no|read-only
* If service is exploited, won’t be able to access admin home and access keys or some private stuff

MountFlags=false
* Capacity to edit Mount table file

ReadWriteDirectories=
ReadOnlyDirectories=
InaccessilblesDirectories=