Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You answered your own question. Bubblewrap uses namespaces, but not by themselves. They're used in conjunction with other tools to provide a security boundary. Even then, it's not a very good security boundary. A serious security boundary should hold up even to privilege escalation, which is not true for bubblewrap.


Each kind of namespace provides its own kind of boundary. Yes, you need something like bubblewrap to stitch that all together. And it is kinda leaky, especially without taking some degree of care.

What're you saying about privilege escalation? I don't see how a user namespace does not prevent/limit privilege escalation.

More than that, I'm interested if there is some broader consensus I'm missing on the shortcomings of namespaces.


> I don't see how a user namespace does not prevent/limit privilege escalation.

They only prevent a single class of privilege escalation from setuid usage within the namespace. You can still obtain root using race conditions, heap overflows, side-channels, etc. or by coordinating with something outside of the namespace like a typical chroot escape.

Here's an old (patched) example of escaping the sandbox:

https://lwn.net/Articles/543273/

> More than that, I'm interested if there is some broader consensus I'm missing on the shortcomings of namespaces.

The consensus is that they're not security features on Linux. I'm not sure who sold you on the idea that they were, because that was not handed down by the kernel devs.

https://lwn.net/Articles/657744/




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: