Тёмный

Unsharing the user namespace for rootless containers 

Aqua Security Open Source
Подписаться 2,6 тыс.
Просмотров 4,3 тыс.
50% 1

Опубликовано:

 

28 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 7   
@binhnguyenthanh5084
@binhnguyenthanh5084 Месяц назад
you shared an impressive knowledge, thank you so much
@shad6392
@shad6392 3 года назад
Thanks. Great stuff. Please do demo like this for other namespaces as well.
@gemini_537
@gemini_537 3 месяца назад
Gemini 1.5 Pro: This video is about user namespaces and how they are used in rootless containers. The speaker, Liz Rice from Aqua Security, starts by explaining what namespaces are and gives different examples of namespaces such as process id namespace and unix time-sharing system namespace. Then she dives into user namespaces. User namespaces map a user id from the host to a different id inside the container. This allows a non-privileged user to appear to be root inside the container. The speaker demonstrates this by running a shell as an unprivileged user and then unsharing the user namespace. She shows that inside the container, she appears to be running as nobody, but from the host perspective, she is still vagrant. One other interesting thing that can be done with user namespaces is to map the user id on the host to become root inside the container. The speaker demonstrates this as well. Even though she appears to be running as root inside the container, from the host perspective, she is still vagrant. This is because user namespaces provide a way to isolate the user id inside the container from the host. Another benefit of user namespaces is that they allow a non-privileged user to create other namespaces, such as a new uts namespace. The speaker demonstrates this by creating a new uts namespace and changing the hostname inside the container. However, from the host perspective, the hostname remains unchanged. In conclusion, user namespaces allow rootless containers to be created. Software inside those containers thinks it's running as root and has all the permissions it needs, but from the host perspective, it is not running as root. This is a major security improvement because it reduces the attack surface.
@ericj.vandervelden5253
@ericj.vandervelden5253 9 месяцев назад
Thank you very much!
@kwameross7722
@kwameross7722 2 года назад
This was not helpful. Needs diagrams.
@redlinejoes
@redlinejoes Год назад
The speak audio level is too low to hear.
@mahendra_chaudhari
@mahendra_chaudhari 10 месяцев назад
not good for this video please delete video and explain again clearly
Далее
Namespace and Cgroups Overview
19:26
Просмотров 4,8 тыс.
Главное рыба есть, а воды нет..
00:54
Say Goodbye To Root Accounts With Podman!
29:40
Просмотров 2,7 тыс.
Understanding user namespaces - Michael Kerrisk
53:30
User Namespaces Part 1, Phil Estes
11:34
Просмотров 10 тыс.
Build your own Container Runtime
37:37
Просмотров 9 тыс.
An introduction to cgroups, runc & containerD
15:24
Просмотров 7 тыс.
Linux Namespaces | TatOG Explains
13:19
Просмотров 461