mirror of
https://github.com/linuxkit/linuxkit.git
synced 2025-07-21 10:09:07 +00:00
sig-security: 2017-05-24 meeting notes
Signed-off-by: Tycho Andersen <tycho@docker.com>
This commit is contained in:
parent
5500302ba5
commit
020c84d01f
@ -26,3 +26,60 @@ Announcement: [Moby project forum post](https://forums.mobyproject.org/t/introdu
|
|||||||
- we can propose additional deep dives and discussion topics!
|
- we can propose additional deep dives and discussion topics!
|
||||||
|
|
||||||
## Meeting Notes
|
## Meeting Notes
|
||||||
|
|
||||||
|
* Administrivia
|
||||||
|
* There is a code of conduct
|
||||||
|
* Attendees from Docker, Intel, HP, Google, IBM, ARM, Arksan (sp?) technologies
|
||||||
|
* What is LinuxKit?
|
||||||
|
* LinuxKit is a toolkit for building container-focused Linuxen. i.e. distro
|
||||||
|
building tool, not a distro itself
|
||||||
|
* Grew out of Docker for \* ({AWS, Mac, etc.})
|
||||||
|
* Borrowed userspace mostly from Alpine
|
||||||
|
* system daemons (e.g. DHCP, possibly SSH, etc.) run in containers, which are
|
||||||
|
distributed as Docker images
|
||||||
|
* base OS is immutable, since daemons are containers
|
||||||
|
* Projects
|
||||||
|
* Clear Containers
|
||||||
|
* Question: what's the Intel feeling r.e. kvmtool, are they still
|
||||||
|
interested in using it for clear containers?
|
||||||
|
* Kernel config
|
||||||
|
* working on a more-sane way to manage kernel config, centered around diffs
|
||||||
|
from defconfig instead of whole configs
|
||||||
|
* Landlock
|
||||||
|
* eBPF LSM that may be a better solution to some of the problems that
|
||||||
|
SELinux can also solve
|
||||||
|
* no assumptions about policy, subjects, objects, etc. made by other LSMs
|
||||||
|
* LSM stacking
|
||||||
|
* hopefully this decade :)
|
||||||
|
* previous versions went up to a v22, but progress being made
|
||||||
|
* mirageSDK
|
||||||
|
* re-write system daemons that have lots attack surface but don't get much
|
||||||
|
attention (dhcpd is a great example, needs privs for netlink and such)
|
||||||
|
* dhcpd works (used in Docker desktop client)
|
||||||
|
* hoping to submit to google clusterfuzz
|
||||||
|
* okernel
|
||||||
|
* improve the linux kernel's ability to protect its own integrity
|
||||||
|
* leverage modern CPU support for things like EPT, to split the kernel into
|
||||||
|
two parts
|
||||||
|
* https://github.com/linux-okernel/linux-okernel
|
||||||
|
* Wireguard
|
||||||
|
* new "VPN" tunnel, meant to replace IPSec or OpenVPN
|
||||||
|
* much smaller codebase
|
||||||
|
* modern crypto
|
||||||
|
* less complexity: no certs, etc. key exchange is done out of band, simply
|
||||||
|
base64 encoded keys
|
||||||
|
* kernel module for now, working on upstreaming
|
||||||
|
* exposes a network device, so everything going through it is secure
|
||||||
|
* IMA namespacing
|
||||||
|
* IMA itself is designed to detect any changes to files
|
||||||
|
* allows users to specify policies about which files to check
|
||||||
|
* EVM protects changes to file xattrs, etc.
|
||||||
|
* IMA is not namespace aware right now, the goal is to be able to add
|
||||||
|
custom policies per-mount-namespace policies
|
||||||
|
* "hardened" channel
|
||||||
|
* maybe don't call it "hardened", since it really means "testing" (staging,
|
||||||
|
probational)
|
||||||
|
* require CI for graduation
|
||||||
|
* wrap up
|
||||||
|
* forum link above
|
||||||
|
* video recording: (TBD)
|
||||||
|
Loading…
Reference in New Issue
Block a user