hadoop-hdfs-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Elek, Marton (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (HDDS-1712) Remove sudo access from Ozone docker image
Date Tue, 16 Jul 2019 16:44:00 GMT

    [ https://issues.apache.org/jira/browse/HDDS-1712?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16886287#comment-16886287
] 

Elek, Marton commented on HDDS-1712:
------------------------------------

bq. Root can jail break from container, when mounting host level files is allowed, such as
mounting /etc/passwd, /proc, /sys/fs. In the Pull Request #1053, it demonstrates the danger
to give hadoop user root privileges without restriction. By printing a write line to /etc/passwd
file, this allows hadoop user to install a root user into host. Hadoop user has the power
to create chaos, when too much privileges is given. We can remove the risk by giving it non-root
privileges access in container.

See my comment in the pull request, this is an independent problem. Even without sudo I can
do the same (use ubuntu image + mount host path)

bq.  Would you be open to fix smoke test on a follow up ticket?

Definitely not. This patch breaks something which works currently. If some of the mentioned
points makes harder to post a proper, fully functional patch, please fix that issue *in advance*
. Thanks a lot.


> Remove sudo access from Ozone docker image
> ------------------------------------------
>
>                 Key: HDDS-1712
>                 URL: https://issues.apache.org/jira/browse/HDDS-1712
>             Project: Hadoop Distributed Data Store
>          Issue Type: Bug
>            Reporter: Eric Yang
>            Assignee: Eric Yang
>            Priority: Major
>              Labels: pull-request-available
>         Attachments: HDDS-1712.001.patch
>
>          Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> Ozone docker image is given unlimited sudo access to hadoop user.  This poses a security
risk where host level user uid 1000 can attach a debugger to the container process to obtain
root access.



--
This message was sent by Atlassian JIRA
(v7.6.14#76016)

---------------------------------------------------------------------
To unsubscribe, e-mail: hdfs-issues-unsubscribe@hadoop.apache.org
For additional commands, e-mail: hdfs-issues-help@hadoop.apache.org


Mime
View raw message