hosted reproducible package building with multiple developers?

seth vidal skvidal at fedoraproject.org
Wed Dec 8 22:14:24 UTC 2010


On Wed, 2010-12-08 at 22:02 +0000, Richard W.M. Jones wrote:
> On Wed, Dec 08, 2010 at 04:50:11PM -0500, seth vidal wrote:
> > On Wed, 2010-12-08 at 22:40 +0100, Till Maas wrote:
> > > On Wed, Dec 08, 2010 at 09:00:51PM +0000, Richard W.M. Jones wrote:
> > > 
> > > > To the original poster: even a VM isn't a completely robust way of
> > > > preventing root escalations.  If the developers are all in your
> > > > "organization", how about using a cluestick-based method to prevent
> > > > them doing this?
> > > 
> > > I guess giving someone a shell account in a VM is usually not less safe
> > > than giving someone shell access on the host of the VM, as long as the
> > > VM does not use kvm and does not run as root. Because even if the user
> > > could break out of the VM, he still has only the same privileges as when
> > > he got a shell access to the host directly.
> > > 
> > 
> > the point is to make the vm's be entirely disposable.
> > 
> > 
> > So you make the vm
> > build the pkg in mock
> > suck the results off
> > destroy the vm
> > 
> > nothing to risk, then.
> 
> If we're being picky then the hypervisor might be exploited during the
> package build, with the exploit escalating to root on the host.  It's
> very hard to pull this off, but with security never say 'never'.
> 
> In any case, using sVirt (libvirt + SELinux) should help.
> 

and this is where I stop caring.

putting it in a vm means I don't care about it for MY systems b/c the
systems are thrown away at the end of us.

How the vendor/serviceprovider/etc of the vm-hosting-infrastructure
protects themselves falls into the SEP category.

-sv




More information about the devel mailing list