mirror of
				https://github.com/linuxkit/linuxkit.git
				synced 2025-10-31 01:37:42 +00:00 
			
		
		
		
	sig-security: 2017-05-24 meeting notes
Signed-off-by: Tycho Andersen <tycho@docker.com>
This commit is contained in:
		| @@ -26,3 +26,60 @@ Announcement: [Moby project forum post](https://forums.mobyproject.org/t/introdu | ||||
|   - we can propose additional deep dives and discussion topics! | ||||
|  | ||||
| ## Meeting Notes | ||||
|  | ||||
| * Administrivia | ||||
|   * There is a code of conduct | ||||
|   * Attendees from Docker, Intel, HP, Google, IBM, ARM, Arksan (sp?) technologies | ||||
| * What is LinuxKit? | ||||
|   * LinuxKit is a toolkit for building container-focused Linuxen. i.e. distro | ||||
|     building tool, not a distro itself | ||||
|   * Grew out of Docker for \* ({AWS, Mac, etc.}) | ||||
|   * Borrowed userspace mostly from Alpine | ||||
|   * system daemons (e.g. DHCP, possibly SSH, etc.) run in containers, which are | ||||
|     distributed as Docker images | ||||
|   * base OS is immutable, since daemons are containers | ||||
| * Projects | ||||
|   * Clear Containers | ||||
|     * Question: what's the Intel feeling r.e. kvmtool, are they still | ||||
|       interested in using it for clear containers? | ||||
|   * Kernel config | ||||
|     * working on a more-sane way to manage kernel config, centered around diffs | ||||
|       from defconfig instead of whole configs | ||||
|   * Landlock | ||||
|     * eBPF LSM that may be a better solution to some of the problems that | ||||
|       SELinux can also solve | ||||
|     * no assumptions about policy, subjects, objects, etc. made by other LSMs | ||||
|   * LSM stacking | ||||
|     * hopefully this decade :) | ||||
|     * previous versions went up to a v22, but progress being made | ||||
|   * mirageSDK | ||||
|     * re-write system daemons that have lots attack surface but don't get much | ||||
|       attention (dhcpd is a great example, needs privs for netlink and such) | ||||
|     * dhcpd works (used in Docker desktop client) | ||||
|     * hoping to submit to google clusterfuzz | ||||
|   * okernel | ||||
|     * improve the linux kernel's ability to protect its own integrity | ||||
|     * leverage modern CPU support for things like EPT, to split the kernel into | ||||
|       two parts | ||||
|     * https://github.com/linux-okernel/linux-okernel | ||||
|   * Wireguard | ||||
|     * new "VPN" tunnel, meant to replace IPSec or OpenVPN | ||||
|     * much smaller codebase | ||||
|     * modern crypto | ||||
|     * less complexity: no certs, etc. key exchange is done out of band, simply | ||||
|       base64 encoded keys | ||||
|     * kernel module for now, working on upstreaming | ||||
|     * exposes a network device, so everything going through it is secure | ||||
|   * IMA namespacing | ||||
|     * IMA itself is designed to detect any changes to files | ||||
|     * allows users to specify policies about which files to check | ||||
|     * EVM protects changes to file xattrs, etc. | ||||
|     * IMA is not namespace aware right now, the goal is to be able to add | ||||
|       custom policies per-mount-namespace policies | ||||
| * "hardened" channel | ||||
|   * maybe don't call it "hardened", since it really means "testing" (staging, | ||||
|     probational) | ||||
|   * require CI for graduation | ||||
| * wrap up | ||||
|   * forum link above | ||||
|   * video recording: (TBD) | ||||
|   | ||||
		Reference in New Issue
	
	Block a user