THE ROUTE TO ROOTLESS

Size: px
Start display at page:

Download "THE ROUTE TO ROOTLESS"

Transcription

1 THE ROUTE TO ROOTLESS

2 THE ROUTE TO ROOTLESS

3 BILL AND TED'S ROOTLESS ADVENTURE

4 THE ROUTE TO ROOTLESS

5 WHAT SECURITY PROBLEM IS GARDEN SOLVING IN CLOUD FOUNDRY?

6 THE PROBLEM IN CLOUD FOUNDRY Public Multi-Tenant Docker Workloads

7 WHAT IS A CONTAINER?

8 THE GREATEST TRICK CONTAINERS EVER PULLED WAS CONVINCING THE WORLD THEY EXIST

9 WHAT IS A CONTAINER? Confinement Own view of the system Fair share of resources Unable to modify constraints Dependency Management

10 CONFINEMENT Linux Namespaces Cgroups Dropping Capabilities Seccomp AppArmor

11 LINUX NAMESPACES There are global resources in linux such as process trees, mount tables, network devices, etc. Namespaces wrap these global system resources to make it appear to the processes within the namespace that they have their own isolated instance of the global resource.

12 LINUX NAMESPACES PID - Process IDs MNT - Mount points NET - Network devices, stacks, ports, etc UTS - Hostname and NIS domain name IPC - Inter Process Communication USER - User and group IDs CGROUP - Cgroup root directory

13 SHARING Control Groups Resource limiting Prioritization Accounting Control Disk Quotas More on this trainwreck later!

14 CAPABILITIES Historically, processes could be privileged (effective user ID = 0, known as root) or unprivileged. Privileged processes would bypass all kernel permission checks. Since 2.2 Linux has divided superuser permissions into distinct units known as capabilities, which can be independently enabled or disabled.

15 CAPABILITIES CAP_SET_UID (change uid) CAP_NET_BIND_SERVICE (listen on privileged ports) CAP_KILL (send signals to any process) CAP_CHOWN (chown any files) CAP_DAC_OVERRIDE (bypass permission checks) CAP_SYS_ADMIN (do all the things!)

16 SECCOMP Seccomp stands for secure computing mode. It's a kernel sandboxing tool since Linux version Enabling seccomp on a process limits the system calls available to that process. Also can limit args allowable in a system call (e.g. namespace clone flags).

17 APPARMOR AppArmor is a mandatory access control mechanism. Profiles are applied to running process to limit access to resources or privilege. rwklx`

18

19 I GET KNOCKED DOWN, BUT I GET UP AGAIN CVE : runc fd traversal: User Namespaces, Capability Dropping, AppArmor CVE : SCSI MICDROP - User Namespaces, AppArmor CVE : ebpf verifier vulnerability - Capability Dropping (sometimes), Seccomp

20 DEPENDENCY MANAGEMENT pivot_root(8) Layered filesystems

21 PIVOT ROOT What's in /? run.sh Boring Host Ubuntu Cool Container Busybox

22 PIVOT ROOT pivot_root! run.sh Boring Host Ubuntu Cool Container Busybox

23 PIVOT ROOT pivot_root! run.sh Boring Host Ubuntu Cool Container Busybox

24 PIVOT ROOT What's in /? run.sh Boring Host Ubuntu Cool Container Busybox

25 LAYERED FILESYSTEMS run.sh

26 LAYERED FILESYSTEMS run.sh /bin/os-specific

27 LAYERED FILESYSTEMS run.sh /bin/os-specific AMI

28 LAYERED FILESYSTEMS run.sh Δ B Δ A Base ROOTFS

29 WHAT IS A CONTAINER? Confinement Own view of the system Fair share of resources Unable to modify constraints Dependency Management

30 SO EVERYTHING IS SECURE IN A CLOUD FOUNDRY CONTAINER RIGHT?

31 YES...BUT...

32

33

34 ROUTE TO ROUTELESS

35 CREDITS Jessie Frazelle Aleksa Sarai Akihiro Suda

36 WHAT IS A CONTAINER? Confinement Own view of the system Fair share of resources Unable to modify constraints Dependency Management

37 CONFINEMENT Unprivileged user namespaces Since Linux 3.8 Just need CAP_SYS_ADMIN in the owning user namespace to do the rest: Other namespaces Seccomp AppArmor

38 HOW DO USER NAMESPACES WORK? Users are living a double life...

39 IN THE HOST

40 IN THE CONTAINER

41 HOW DO USER NAMESPACES WORK? /proc/self/uid_map and /proc/self/gid_map specify user id mappings from outer to inner user namespace. Mappings are triples of (inner ID, outer ID, range)

42 CONFINEMENT How do unprivileged user namespaces work? newuidmap/newgidmap setuid binaries validate mappings against /etc/subuid PRed support to runc

43 SHARING There's no way to do cgroups entirely unprivileged yet cgroups are a virtual filesystem like proc /sys/fs/cgroup/memory/** Files are owned by root by default Privileged setup can chown cgroups to our container root user, so runc can write to them PRed support to runc

44 DEPENDENCY MANAGEMENT pivot_root(8) User namespace gives us CAP_SYS_ADMIN

45 DEPENDENCY MANAGEMENT Layered filesystems AUFS mounts Not possible unprivileged BTRFS Snapshots OverlayFS mounts

46 DEPENDENCY MANAGEMENT Layered filesystems AUFS mounts (not possible unprivileged) BTRFS Snapshots Initial setup as privileged Snapshots can be done unprivileged Exploded with quotas at scale :( OverlayFS mounts (seems to be working?!)

47 DEPENDENCY MANAGEMENT Layered filesystems AUFS mounts (not possible unprivileged) BTRFS Snapshots OverlayFS mounts Possible on Ubuntu unprivileged Seems to be working?!

48 OVERLAY ROOTFUL

49 OVERLAY ROOTLESS

50 ROAD BLOCKS

51 DISK QUOTAS We use XFS for filesystem quotas XFS requires privilege Small, focused setuid binary just for quota management

52 NETWORKING Networking used to be integrated into Garden Garden supports a plugin architecture garden-external-networker is setuid Some awesome work going on from Aleksa Sarai and Akihiro Suda on this front!

53 GDN SETUP cgroup chowning in garden setup No user input Before any workload can be running in CF At least one attempt to fix this by Aleksa Sarai, but no luck yet

54 BUT IT'S OK...

55 REDUCING PRIVILEGE Reduce privilege where we can, when we can Break apart monoliths to only allow privilege where required Some things take time Proving out slowly is a positive thing It's getting better!

56 DOES IT WORK?

57 HOW CAN I TRY IT? Experimental config option in BOSH manifest

58 THANKS

59 "ET TU ROOT?" - JULIUS CAESAR

The State of Rootless Containers

The State of Rootless Containers The State of Rootless Containers Aleksa Sarai / SUSE Akihiro Suda / NTT @lordcyphar @_AkihiroSuda_ Who are we? Aleksa Sarai Senior Software Engineer at SUSE. Maintainer of runc and several other Open Container

More information

Rootless Containers with runc. Aleksa Sarai Software Engineer

Rootless Containers with runc. Aleksa Sarai Software Engineer Rootless Containers with runc Aleksa Sarai Software Engineer asarai@suse.de Who am I? Software Engineer at SUSE. Student at University of Sydney. Physics and Computer Science. Maintainer of runc. Long-time

More information

Docker A FRAMEWORK FOR DATA INTENSIVE COMPUTING

Docker A FRAMEWORK FOR DATA INTENSIVE COMPUTING Docker A FRAMEWORK FOR DATA INTENSIVE COMPUTING Agenda Intro / Prep Environments Day 1: Docker Deep Dive Day 2: Kubernetes Deep Dive Day 3: Advanced Kubernetes: Concepts, Management, Middleware Day 4:

More information

OS Security III: Sandbox and SFI

OS Security III: Sandbox and SFI 1 OS Security III: Sandbox and SFI Chengyu Song Slides modified from Dawn Song 2 Administrivia Lab2 VMs on lab machine Extension? 3 Users and processes FACT: although ACLs use users as subject, the OS

More information

Understanding user namespaces

Understanding user namespaces Understanding user namespaces Understanding user namespaces Michael Kerrisk, man7.org c 2018 mtk@man7.org 31 January 2018, San Jose, CA, USA Outline 1 Introduction 3 2 Some background: capabilities 6 3

More information

Sandboxing. CS-576 Systems Security Instructor: Georgios Portokalidis Spring 2018

Sandboxing. CS-576 Systems Security Instructor: Georgios Portokalidis Spring 2018 Sandboxing CS-576 Systems Security Instructor: Georgios Portokalidis Sandboxing Means Isolation Why? Software has bugs Defenses slip Untrusted code Compartmentalization limits interference and damage!

More information

Container mechanics in Linux and rkt FOSDEM 2016

Container mechanics in Linux and rkt FOSDEM 2016 Container mechanics in Linux and rkt FOSDEM 2016 Alban Crequy github.com/alban Jonathan Boulle github.com/jonboulle @baronboulle a modern, secure, composable container runtime an implementation of appc

More information

Docker Security. Mika Vatanen

Docker Security. Mika Vatanen Docker Security Mika Vatanen 13.6.2017 About me Mika Vatanen, Solution Architect @ Digia 18 years at the industry, 6 months at Digia Established ii2 a Finnish MySpace, top-5 most used web service in Finland

More information

1 Virtualization Recap

1 Virtualization Recap 1 Virtualization Recap 2 Recap 1 What is the user part of an ISA? What is the system part of an ISA? What functionality do they provide? 3 Recap 2 Application Programs Libraries Operating System Arrows?

More information

Travis Cardwell Technical Meeting

Travis Cardwell Technical Meeting .. Introduction to Docker Travis Cardwell Tokyo Linux Users Group 2014-01-18 Technical Meeting Presentation Motivation OS-level virtualization is becoming accessible Docker makes it very easy to experiment

More information

ViryaOS RFC: Secure Containers for Embedded and IoT. A proposal for a new Xen Project sub-project

ViryaOS RFC: Secure Containers for Embedded and IoT. A proposal for a new Xen Project sub-project ViryaOS RFC: Secure Containers for Embedded and IoT A proposal for a new Xen Project sub-project Stefano Stabellini @stabellinist The problem Package applications for the target Contain all dependencies

More information

Namespaces and Capabilities Overview and Recent Developments

Namespaces and Capabilities Overview and Recent Developments Namespaces and Capabilities Overview and Recent Developments Linux Security Summit Europe Edinburgh, Scotland Christian Brauner christian@brauner.io christian.brauner@ubuntu.com @brau_ner https://brauner.github.io/

More information

Container Security. Daniel J Walsh Consulting Engineer Blog: danwalsh.livejournal.com

Container Security. Daniel J Walsh Consulting Engineer Blog: danwalsh.livejournal.com Container Security Daniel J Walsh Consulting Engineer Twitter: @rhatdan Blog: danwalsh.livejournal.com Email: dwalsh@redhat.com Container Security Container Security As explained by the three pigs Chapter

More information

State of Containers. Convergence of Big Data, AI and HPC

State of Containers. Convergence of Big Data, AI and HPC State of Containers Convergence of Big Data, AI and HPC Technology ReCap Comparison of Hypervisor and Container Virtualization VM1 VM2 appa appb Userland Userland Kernel Kernel Operational Abstraction

More information

High Performance Containers. Convergence of Hyperscale, Big Data and Big Compute

High Performance Containers. Convergence of Hyperscale, Big Data and Big Compute High Performance Containers Convergence of Hyperscale, Big Data and Big Compute Christian Kniep Technical Account Manager, Docker Brief Recap of Container Technology Brief History of Container Technology

More information

Infrastructure Security 2.0

Infrastructure Security 2.0 Infrastructure Security 2.0 $ whoami Infrastructure Security Engineer @ Shopify Certified Kubernetes Administrator twitter.com/jonpulsifer github.com/jonpulsifer Previously Team Lead at CFNOC Network Defense

More information

Introduction to Container Technology. Patrick Ladd Technical Account Manager April 13, 2016

Introduction to Container Technology. Patrick Ladd Technical Account Manager April 13, 2016 Introduction to Container Technology Patrick Ladd Technical Account Manager April 13, 2016 Container Technology Containers 3 "Linux Containers" is a Linux kernel feature to contain a group of processes

More information

LXC(Linux Container) Lightweight virtual system mechanism Gao feng

LXC(Linux Container) Lightweight virtual system mechanism Gao feng LXC(Linux Container) Lightweight virtual system mechanism Gao feng gaofeng@cn.fujitsu.com 1 Outline Introduction Namespace System API Libvirt LXC Comparison Problems Future work 2 Introduction Container:

More information

Container Isolation at Scale (... and introducing gvisor) Dawn Chen and Zhengyu He

Container Isolation at Scale (... and introducing gvisor) Dawn Chen and Zhengyu He Container Isolation at Scale (... and introducing gvisor) Dawn Chen and Zhengyu He Containers are amazing! Year 2013: Docker Inc. released its container engine Million downloads and about 8,000 docker

More information

OS Containers. Michal Sekletár November 06, 2016

OS Containers. Michal Sekletár November 06, 2016 OS Containers Michal Sekletár msekleta@redhat.com November 06, 2016 whoami Senior Software Engineer @ Red Hat systemd and udev maintainer Free/Open Source Software contributor Michal Sekletár msekleta@redhat.com

More information

How to build and run OCI containers

How to build and run OCI containers How to build and run OCI containers A shallow dive on the OCI container configuration and an overview of the available tools whoami Spyros Trigazis Computing Engineer at CERN s cloud team Project Team

More information

User Namespaces. Linux Capabilities and Namespaces. Outline. Michael Kerrisk, man7.org c 2018 March 2018

User Namespaces. Linux Capabilities and Namespaces. Outline. Michael Kerrisk, man7.org c 2018 March 2018 Linux Capabilities and Namespaces User Namespaces Michael Kerrisk, man7.org c 2018 mtk@man7.org March 2018 Outline 9 User Namespaces 9-1 9.1 Introduction 9-3 9.2 Creating and joining a user NS 9-9 9.3

More information

Landlock LSM: toward unprivileged sandboxing

Landlock LSM: toward unprivileged sandboxing Landlock LSM: toward unprivileged sandboxing Mickaël Salaün ANSSI September 14, 2017 1 / 21 Secure user-space software How to harden an application? secure development follow the least privilege principle

More information

OS Virtualization. Linux Containers (LXC)

OS Virtualization. Linux Containers (LXC) OS Virtualization Emulate OS-level interface with native interface Lightweight virtual machines No hypervisor, OS provides necessary support Referred to as containers Solaris containers, BSD jails, Linux

More information

Container Security. Docker London July 20, Everything You Probably Should Know

Container Security. Docker London July 20, Everything You Probably Should Know Docker London July 20, 2016 Container Security Everything You Probably Should Know...but most of which I m neither an expert on nor could we ever cover in the time allotted... 1 Who am I? (skipping the

More information

Overlayfs And Containers. Miklos Szeredi, Red Hat Vivek Goyal, Red Hat

Overlayfs And Containers. Miklos Szeredi, Red Hat Vivek Goyal, Red Hat Overlayfs And Containers Miklos Szeredi, Red Hat Vivek Goyal, Red Hat Introduction to overlayfs Union or? Union: all layers made equal How do you take the union of two files? Or a file and a directory?

More information

TEN LAYERS OF CONTAINER SECURITY

TEN LAYERS OF CONTAINER SECURITY TEN LAYERS OF CONTAINER SECURITY A Deeper Dive 2 WHAT ARE CONTAINERS? It depends on who you ask... INFRASTRUCTURE APPLICATIONS Sandboxed application processes on a shared Linux OS kernel Simpler, lighter,

More information

How Container Runtimes matter in Kubernetes?

How Container Runtimes matter in Kubernetes? How Container Runtimes matter in Kubernetes? Kunal Kushwaha NTT OSS Center About me Works @ NTT Open Source Software Center Contributes to containerd and other related projects. Docker community leader,

More information

HTCondor: Virtualization (without Virtual Machines)

HTCondor: Virtualization (without Virtual Machines) HTCondor: Virtualization (without Virtual Machines) Brian Bockelman HTCondor Week 2013 Dictionary Definition vir tu al ize [vur-choo-uh-lahyz] verb to create a virtual version of (a computer, operating

More information

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency Background / Motivation Increasing desire to use mobile devices throughout the US government.

More information

Security Namespace: Making Linux Security Frameworks Available to Containers

Security Namespace: Making Linux Security Frameworks Available to Containers Security Namespace: Making Linux Security Frameworks Available to Containers Yuqiong Sun, Symantec Research Labs; David Safford, GE Global Research; Mimi Zohar, Dimitrios Pendarakis, and Zhongshu Gu, IBM

More information

Operating system security models

Operating system security models Operating system security models Unix security model Windows security model MEELIS ROOS 1 General Unix model Everything is a file under a virtual root diretory Files Directories Sockets Devices... Objects

More information

Introduction to Containers

Introduction to Containers Introduction to Containers Shawfeng Dong Principal Cyberinfrastructure Engineer University of California, Santa Cruz What are Containers? Containerization, aka operating-system-level virtualization, refers

More information

Container Detection and Forensics, Gotta catch them all!

Container Detection and Forensics, Gotta catch them all! Container Detection and Forensics, Gotta catch them all! Cem Gürkök Detection Infra Summary Docker? What is osquery and Docker capabilities What is Volatility and Docker capabilities Use cases How to detect

More information

STATUS OF PLANS TO USE CONTAINERS IN THE WORLDWIDE LHC COMPUTING GRID

STATUS OF PLANS TO USE CONTAINERS IN THE WORLDWIDE LHC COMPUTING GRID The WLCG Motivation and benefits Container engines Experiments status and plans Security considerations Summary and outlook STATUS OF PLANS TO USE CONTAINERS IN THE WORLDWIDE LHC COMPUTING GRID SWISS EXPERIENCE

More information

Linux Containers Roadmap Red Hat Enterprise Linux 7 RC. Bhavna Sarathy Senior Technology Product Manager, Red Hat

Linux Containers Roadmap Red Hat Enterprise Linux 7 RC. Bhavna Sarathy Senior Technology Product Manager, Red Hat Linux Containers Roadmap Red Hat Enterprise Linux 7 RC Bhavna Sarathy Senior Technology Product Manager, Red Hat Linda Wang Senior Eng. Manager, Red Hat Bob Kozdemba Principal Soln. Architect, Red Hat

More information

PROCESS MANAGEMENT Operating Systems Design Euiseong Seo

PROCESS MANAGEMENT Operating Systems Design Euiseong Seo PROCESS MANAGEMENT 2016 Operating Systems Design Euiseong Seo (euiseong@skku.edu) Definition A process is a program in execution Context Resources Specifically, Register file state Address space File and

More information

OCI Runtime Tools for Container Standardization

OCI Runtime Tools for Container Standardization OCI Runtime Tools for Container Standardization Ma Shimiao Agenda Background OCI Introduction Runtime Tools Our Contribution Future Plans Q&A 1 Background Container-based

More information

SOFT CONTAINER TOWARDS 100% RESOURCE UTILIZATION ACCELA ZHAO, LAYNE PENG

SOFT CONTAINER TOWARDS 100% RESOURCE UTILIZATION ACCELA ZHAO, LAYNE PENG SOFT CONTAINER TOWARDS 100% RESOURCE UTILIZATION ACCELA ZHAO, LAYNE PENG 1 WHO ARE THOSE GUYS Accela Zhao, Technologist at EMC OCTO, active Openstack community contributor, experienced in cloud scheduling

More information

Flatpak a technical walk-through. Alexander Larsson, Red Hat

Flatpak a technical walk-through. Alexander Larsson, Red Hat Flatpak a technical walk-through Alexander Larsson, Red Hat What is Flatpak? apps for the Linux Desktop Distribute your app Run it anywhere Build in anywhere Run it sandboxed How is this different from

More information

Hacking and Hardening Kubernetes

Hacking and Hardening Kubernetes SESSION ID: HT-W02 Hacking and Hardening Kubernetes Jay Beale CTO InGuardians, Inc @jaybeale and @inguardians Adam Crompton Senior Security Analyst InGuardians, Inc. @3nc0d3r and @inguardians Table of

More information

An introduction to Docker

An introduction to Docker An introduction to Docker Ing. Vincenzo Maffione Operating Systems Security Container technologies on Linux Several light virtualization technologies are available for Linux They build on cgroups, namespaces

More information

CONTAINER AND MICROSERVICE SECURITY ADRIAN MOUAT

CONTAINER AND MICROSERVICE SECURITY ADRIAN MOUAT CONTAINER AND MICROSERVICE SECURITY ADRIAN MOUAT Chief Scientist @ Container Solutions Wrote "Using Docker" for O'Reilly 40% Discount with AUTHD code Free Docker Security minibook http://www.oreilly.com/webops-perf/free/dockersecurity.csp

More information

Capabilities. Linux Capabilities and Namespaces. Outline. Michael Kerrisk, man7.org c 2018 March 2018

Capabilities. Linux Capabilities and Namespaces. Outline. Michael Kerrisk, man7.org c 2018 March 2018 Linux Capabilities and Namespaces Capabilities Michael Kerrisk, man7.org c 2018 mtk@man7.org March 2018 Outline 4 Capabilities 4-1 4.1 Overview 4-3 4.2 Process and file capabilities 4-8 4.3 Shell commands

More information

Cloud Foundry Diego: The New Cloud Runtime. Heterogeneous Container Scheduling, Docker & More

Cloud Foundry Diego: The New Cloud Runtime. Heterogeneous Container Scheduling, Docker & More Cloud Foundry Diego: The New Cloud Runtime Heterogeneous Container Scheduling, Docker & More How many people here are already running containers? Cloud Native Application Platform A single API for managing

More information

Containers and isolation as implemented in the Linux kernel

Containers and isolation as implemented in the Linux kernel Containers and isolation as implemented in the Linux kernel Technical Deep Dive Session Hannes Frederic Sowa Senior Software Engineer 13. September 2016 Outline Containers and isolation

More information

Samba and Chrome OS the Start of a beautiful Friendship

Samba and Chrome OS the Start of a beautiful Friendship Samba and Chrome OS the Start of a beautiful Friendship Lutz Justen ljusten@google.com sambaxp, Göttingen June 06, 2018 Topics Chrome OS and Chromebooks Active Directory Integration How it works, management,

More information

Deploy containers on your cluster - A proof of concept

Deploy containers on your cluster - A proof of concept Deploy containers on your cluster - A proof of concept What is HPC cluster (in my world!) Where do I come from? Run and maintain a bioinformatics cluster at Bioinformatic Research Centre (BiRC), Aarhus

More information

File access-control per container with Landlock

File access-control per container with Landlock File access-control per container with Landlock Mickaël Salaün ANSSI February 4, 2018 1 / 20 Secure user-space software How to harden an application? secure development follow the least privilege principle

More information

Docker Deep Dive. Daniel Klopp

Docker Deep Dive. Daniel Klopp Docker Deep Dive Daniel Klopp The Talk I m not telling you what fishing rod to use The Talk I m not telling you what fishing rod to use I m helping you understand the fishing rod The Talk I m not telling

More information

Secure and Simple Sandboxing in SELinux

Secure and Simple Sandboxing in SELinux Secure and Simple Sandboxing in SELinux James Morris jmorris@namei.org FOSS.my 2009 Kuala Lumpur, Malaysia Overview Sandboxing SELinux Sandbox design and implementation Use examples Status and future directions

More information

Engineering Robust Server Software

Engineering Robust Server Software Engineering Robust Server Software Containers Isolation Isolation: keep different programs separate Good for security Might also consider performance isolation Also has security implications (side channel

More information

Secure Architecture Principles

Secure Architecture Principles Computer Security Course. Secure Architecture Principles Slides credit: Dan Boneh What Happens if you can t drop privilege? In what example scenarios does this happen? A service loop E.g., ssh Solution?

More information

Comparing Next-Generation Container Image Building Tools

Comparing Next-Generation Container Image Building Tools Open Source Summit Japan (June 20-22, 2018) Comparing Next-Generation Container Image Building Tools Akihiro Suda ( @_AkihiroSuda_ ) NTT Software Innovation Center Who am I Software Engineer at NTT GitHub:

More information

IBM Research Report. Docker and Container Security White Paper

IBM Research Report. Docker and Container Security White Paper RC25625 (WAT1607-027) July 15, 2016 Computer Science IBM Research Report Docker and Container Security White Paper Salman Baset, Stefan Berger, James Bottomley, Canturk Isci, Nataraj Nagaratnam 1, Dimitrios

More information

Course 55187B Linux System Administration

Course 55187B Linux System Administration Course Outline Module 1: System Startup and Shutdown This module explains how to manage startup and shutdown processes in Linux. Understanding the Boot Sequence The Grand Unified Boot Loader GRUB Configuration

More information

The Linux capabilities model

The Linux capabilities model jambit Abendvortrag "Containers unplugged" The Linux capabilities model Michael Kerrisk, man7.org 2019 mtk@man7.org 2 April 2019, Munich Outline 1 Overview 4 2 Process and file capabilities 9 3 Permitted

More information

CSCE 410/611: Virtualization

CSCE 410/611: Virtualization CSCE 410/611: Virtualization Definitions, Terminology Why Virtual Machines? Mechanics of Virtualization Virtualization of Resources (Memory) Some slides made available Courtesy of Gernot Heiser, UNSW.

More information

Singularity: Containers for High-Performance Computing. Grigory Shamov Nov 21, 2017

Singularity: Containers for High-Performance Computing. Grigory Shamov Nov 21, 2017 Singularity: Containers for High-Performance Computing Grigory Shamov Nov 21, 2017 Outline Software and High Performance Computing: Installation/Maintenance of the HPC Software stack Why containers and

More information

Intro to Container Security. Thomas Cameron Global Cloud Strategy Evangelist Mrunal Patel Principal Software Engineer

Intro to Container Security. Thomas Cameron Global Cloud Strategy Evangelist Mrunal Patel Principal Software Engineer Intro to Container Security Thomas Cameron Global Cloud Strategy Evangelist Mrunal Patel Principal Software Engineer Agenda INTRODUCTION Who are we and why should you care? RED HAT AND CONTAINERS A brief

More information

Seccomp, network and namespaces. Francesco Tornieri <francesco.tornieri AT kiratech.it>

Seccomp, network and namespaces. Francesco Tornieri <francesco.tornieri AT kiratech.it> Seccomp, network and namespaces Francesco Tornieri VM vs Container 2 Namespaces ecc 3 Namespaces ecc man namespaces: A namespaces wraps a global system resource in a

More information

Docker und IBM Digital Experience in Docker Container

Docker und IBM Digital Experience in Docker Container Docker und IBM Digital Experience in Docker Container 20. 21. Juni 2017 IBM Labor Böblingen 1 What is docker Introduction VMs vs. containers Terminology v Docker components 2 6/22/2017 What is docker?

More information

Next Generation Tools for container technology. Dan

Next Generation Tools for container technology. Dan Next Generation Tools for container technology Dan Walsh @rhatdan Please Stand Please read out loud all text in RED I Promise To say Container Registries Rather than Docker registries I Promise To say

More information

Docker 101 Workshop. Eric Smalling - Solution Architect, Docker

Docker 101 Workshop. Eric Smalling - Solution Architect, Docker Docker 101 Workshop Eric Smalling - Solution Architect, Docker Inc. @ericsmalling Who Am I? Eric Smalling Solution Architect Docker Customer Success Team ~25 years in software development, architecture,

More information

深 入解析 Docker 背后的 Linux 内核技术. 孙健波浙江 大学 SEL/VLIS 实验室

深 入解析 Docker 背后的 Linux 内核技术. 孙健波浙江 大学 SEL/VLIS 实验室 深 入解析 Docker 背后的 Linux 内核技术 孙健波浙江 大学 SEL/VLIS 实验室 www.sel.zju.edu.cn Agenda Namespace ipc uts pid network mount user Cgroup what are cgroups? usage concepts implementation What is Namespace? Lightweight

More information

Multitenancy Deep Dive

Multitenancy Deep Dive Multitenancy Deep Dive Thursday, December 7 2:00pm - 3:20pm David Oppenheimer (Google) davidopp@google.com Quinton Hoole (Huawei) quinton.hoole@huawei.com Agenda Presentations Discussion of topics of interest

More information

Container Security and new container technologies. Dan

Container Security and new container technologies. Dan Container Security and new container technologies Dan Walsh @rhatdan Please Stand Please read out loud all text in RED I Promise To say Container Registries Rather than Docker registries I Promise To say

More information

Securing Microservices Containerized Security in AWS

Securing Microservices Containerized Security in AWS Securing Microservices Containerized Security in AWS Mike Gillespie, Solutions Architect, Amazon Web Services Splitting Monoliths Ten Years Ago Splitting Monoliths Ten Years Ago XML & SOAP Splitting Monoliths

More information

TEN LAYERS OF CONTAINER SECURITY

TEN LAYERS OF CONTAINER SECURITY TEN LAYERS OF CONTAINER SECURITY Tim Hunt Kirsten Newcomer May 2017 ABOUT YOU Are you using containers? What s your role? Security professionals Developers / Architects Infrastructure / Ops Who considers

More information

CS-580K/480K Advanced Topics in Cloud Computing. Container III

CS-580K/480K Advanced Topics in Cloud Computing. Container III CS-580/480 Advanced Topics in Cloud Computing Container III 1 Docker Container https://www.docker.com/ Docker is a platform for developers and sysadmins to develop, deploy, and run applications with containers.

More information

SAINT LOUIS JAVA USER GROUP MAY 2014

SAINT LOUIS JAVA USER GROUP MAY 2014 SAINT LOUIS JAVA USER GROUP MAY 2014 STEVEN BORRELLI steve@borrelli.org @stevendborrelli ABOUT ME FIRST COMPUTER: SYSTEMS ENGINEERING MANAGEMENT FOUNDER, ASTERIS (JAN 2014) @ ORGANIZER OF STL MACHINE LEARNING

More information

ISLET: Jon Schipp, AIDE jonschipp.com. An Attempt to Improve Linux-based Software Training

ISLET: Jon Schipp, AIDE jonschipp.com. An Attempt to Improve Linux-based Software Training ISLET: An Attempt to Improve Linux-based Software Training Jon Schipp, AIDE 2015 jonschipp@gmail.com, @Jonschipp, jonschipp.com About me: Security Engineer for the National Center for Supercomputing Applications

More information

Charliecloud Unprivileged Containers for HPC

Charliecloud Unprivileged Containers for HPC LA-UR-18-23001 Charliecloud Unprivileged Containers for HPC Michael Jennings (@mej0) mej@lanl.gov Reid Priedhorsky reidpr@lanl.gov Tim Randles trandles@lanl.gov 2018 HPCXXL Winter Meeting 2018 HPC Advisory

More information

Docker and Security. September 28, 2017 VASCAN Michael Irwin

Docker and Security. September 28, 2017 VASCAN Michael Irwin Docker and Security September 28, 2017 VASCAN Michael Irwin Quick Intro - Michael Irwin 2011 - Graduated (CS@VT); started full-time at VT Sept 2015 - Started using Docker for QA June 2016 - Attended first

More information

Portable, lightweight, & interoperable Docker containers across Red Hat solutions

Portable, lightweight, & interoperable Docker containers across Red Hat solutions Portable, lightweight, & interoperable Docker containers across Red Hat solutions Jérôme Petazzoni Tinkerer Extraordinaire Docker, Inc Alexander Larsson Principal Software engineer Red Hat, Inc What? Why?

More information

Infoblox Kubernetes1.0.0 IPAM Plugin

Infoblox Kubernetes1.0.0 IPAM Plugin 2h DEPLOYMENT GUIDE Infoblox Kubernetes1.0.0 IPAM Plugin NIOS version 8.X August 2018 2018 Infoblox Inc. All rights reserved. Infoblox Kubernetes 1.0.0 IPAM Deployment Guide August 2018 Page 1 of 18 Overview...

More information

Zdeněk Kubala Senior QA

Zdeněk Kubala Senior QA (Kernel) Isolation PV, HVM, OS-V technologies in Linux Introduction and description of the isolation diferences between HM, PV and OS-level virt. technologies. Zdeněk Kubala Senior QA Engineer zkubala@suse.com

More information

Linux Kernel Security Overview

Linux Kernel Security Overview Linux Kernel Security Overview Linux Security Summit Europe 2018 Edinburgh, UK James Morris jmorris@namei.org $ whoami Linux kernel security subsystem maintainer Linux kernel engineer at Microsoft Previously

More information

TEN LAYERS OF CONTAINER SECURITY. Kirsten Newcomer Security Strategist

TEN LAYERS OF CONTAINER SECURITY. Kirsten Newcomer Security Strategist TEN LAYERS OF CONTAINER SECURITY Kirsten Newcomer Security Strategist WHAT ARE CONTAINERS? Containers change how we develop, deploy and manage applications INFRASTRUCTURE Sandboxed application processes

More information

We ve seen: Protection: ACLs, Capabilities, and More. Access control. Principle of Least Privilege. ? Resource. What makes it hard?

We ve seen: Protection: ACLs, Capabilities, and More. Access control. Principle of Least Privilege. ? Resource. What makes it hard? We ve seen: Protection: ACLs, Capabilities, and More Some cryptographic techniques Encryption, hashing, types of keys,... Some kinds of attacks Viruses, worms, DoS,... And a distributed authorization and

More information

Exam LFCS/Course 55187B Linux System Administration

Exam LFCS/Course 55187B Linux System Administration Exam LFCS/Course 55187B Linux System Administration About this course This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

Replacing Docker With Podman. By Dan

Replacing Docker With Podman. By Dan Replacing Docker With Podman By Dan Walsh @rhatdan dnf install -y podman dnf install -y podman alias docker=podman Questions Blog: https://podman.io/blogs Github: https://github.com/projectatomic/libpod

More information

Is it safe to run applications in Linux Containers?

Is it safe to run applications in Linux Containers? Is it safe to run applications in Linux Containers? Jérôme Petazzoni @jpetazzo Docker Inc. @docker Is it safe to run applications in Linux Containers? And, can Docker do anything about it? Question: Is

More information

Securing Containers on the High Seas. Jack OWASP Belgium September 2018

Securing Containers on the High Seas. Jack OWASP Belgium September 2018 Securing Containers on the High Seas Jack Mannino @ OWASP Belgium September 2018 Who Am I? Jack Mannino CEO at nvisium, since 2009 Former OWASP Northern Virginia chapter leader Hobbies: Scala, Go and Kubernetes

More information

Sandboxing Linux code to mitigate exploitation. (Or: How to ship a secure operating system that includes third-party code)

Sandboxing Linux code to mitigate exploitation. (Or: How to ship a secure operating system that includes third-party code) Sandboxing Linux code to mitigate exploitation (Or: How to ship a secure operating system that includes third-party code) Work by Will Drewry, Elly Jones, Kees Cook, Chris Evans, Julien Tinnes, Markus

More information

Linux Filesystems and Storage Chris Mason Fusion-io

Linux Filesystems and Storage Chris Mason Fusion-io Linux Filesystems and Storage Chris Mason Fusion-io 2012 Storage Developer Conference. Insert Your Company Name. All Rights Reserved. Linux 2.4.x Enterprise Ready! Start of SMP scalability Many journaled

More information

Cross platform enablement for the yocto project with containers. ELC 2017 Randy Witt Intel Open Source Technology Center

Cross platform enablement for the yocto project with containers. ELC 2017 Randy Witt Intel Open Source Technology Center Cross platform enablement for the yocto project with containers ELC 2017 Randy Witt Intel Open Source Technology Center My personal problems Why d I even do this? THE multiple distro Problem Yocto Project

More information

Distributed Computing Framework Based on Software Containers for Heterogeneous Embedded Devices

Distributed Computing Framework Based on Software Containers for Heterogeneous Embedded Devices Distributed Computing Framework Based on Software Containers for Heterogeneous Embedded Devices Daniel José Bruzual Balzan School of Science Thesis submitted for examination for the degree of Master of

More information

Secure Containers with EPT Isolation

Secure Containers with EPT Isolation Secure Containers with EPT Isolation Chunyan Liu liuchunyan9@huawei.com Jixing Gu jixing.gu@intel.com Presenters Jixing Gu: Software Architect, from Intel CIG SW Team, working on secure container solution

More information

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 13: Operating System Security Department of Computer Science and Engineering University at Buffalo 1 Review Previous topics access control authentication session

More information

Container's Anatomy. Namespaces, cgroups, and some filesystem magic 1 / 59

Container's Anatomy. Namespaces, cgroups, and some filesystem magic 1 / 59 Container's Anatomy Namespaces, cgroups, and some filesystem magic 1 / 59 Who am I? Jérôme Petazzoni (@jpetazzo) French software engineer living in California I have built and scaled the dotcloud PaaS

More information

ISSN (Online)

ISSN (Online) Build Minimal Docker Container Using Golang [1] Biradar Sangam.M, [2] R.Shekhar [1][2] Department of Computer Science & Engineering, Alliance University, Bangalore, INDIA Abstract: - Docker container is

More information

Dockerized Tizen Platform

Dockerized Tizen Platform Dockerized 1 Tizen Platform Copyright 2017 Samsung. All Rights Reserved. Abstract Tizen Pla.orm ECO System Container ECO System Build CI Management (Update) Cloud Monitoring Store Data (DB) Cloud 2 Cloud

More information

Centre de Calcul de l Institut National de Physique Nucléaire et de Physique des Particules. Singularity overview. Vanessa HAMAR

Centre de Calcul de l Institut National de Physique Nucléaire et de Physique des Particules. Singularity overview. Vanessa HAMAR Centre de Calcul de l Institut National de Physique Nucléaire et de Physique des Particules Singularity overview Vanessa HAMAR Disclaimer } The information in this presentation was compiled from different

More information

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B::

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B:: Module Title Duration : 55187B: Linux System Administration : 4 days Overview This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

Alternatives to Solaris Containers and ZFS for Linux on System z

Alternatives to Solaris Containers and ZFS for Linux on System z Alternatives to Solaris Containers and ZFS for Linux on System z Cameron Seader (cs@suse.com) SUSE Tuesday, March 11, 2014 Session Number 14540 Agenda Quick Overview of Solaris Containers and ZFS Linux

More information

Linux Capabilities & Set-UID Vulnerability

Linux Capabilities & Set-UID Vulnerability Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative

More information

Splunk N Box. Splunk Multi-Site Clusters In 20 Minutes or Less! Mohamad Hassan Sales Engineer. 9/25/2017 Washington, DC

Splunk N Box. Splunk Multi-Site Clusters In 20 Minutes or Less! Mohamad Hassan Sales Engineer. 9/25/2017 Washington, DC Splunk N Box Splunk Multi-Site Clusters In 20 Minutes or Less! Mohamad Hassan Sales Engineer 9/25/2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking

More information

Introduction to Virtualization and Containers Phil Hopkins

Introduction to Virtualization and Containers Phil Hopkins Introduction to Virtualization and Containers Phil Hopkins @twitterhandle Virtualization What is it? Introduction to Virtualization and Containers What the heck is a hypervisor? Why are there so many of

More information