Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Look into unpriviledged namespaces #1852

Open
dngray opened this issue Oct 22, 2022 · 0 comments
Open

Look into unpriviledged namespaces #1852

dngray opened this issue Oct 22, 2022 · 0 comments

Comments

@dngray
Copy link
Member

dngray commented Oct 22, 2022

Description

URL of affected page: https://www.privacyguides.org/linux-desktop/hardening/#kernel-hardening

There was a post on reddit that kernel.unprivileged_userns_clone=0 doesn't stop docker running.

Kernel sysctl option kernel.unprivileged_userns_clone=0 doesn't stop docker from working. Flatpak has an issue but on Arch there's an alternative bwrap package that fixes this and is mentioned on the bubble wrap wiki.

I assume this requires docker to run as root though, which means no rootless docker.

I had a look at the bubblewrap mentioned there, doesn't seem to be anything about it except for:

linux-hardened users may need to install bubblewrap-suid instead of the packages mentioned above. See FS#63316 for more information.

We could elaborate a little there on why things like linux-hardened disable kernel.unprivileged_userns_clone=0, for example that it has been responsible for multiple privilege escalation vulnerabilities etc.

As for the "encrypted boot" part of that comment, we're removing this section #1850

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant