Closed yannickhilber closed 9 months ago
CC @mrcnski
Hey @yannickhilber, thanks for the report. I guess you were getting a warning on v1.3.0, it just was not a hard error yet like it is now. If you have the old logs you could double-check that; if the warning was not there, it means it's probably a regression introduced in the recent versions.
But this seems expected, since containers may prevent some of our security features. We have landlock as an alternative filesystem protection to unshare/pivot_root, but it's only available on Linux 5.13+. If possible, I'd suggest upgrading the Linux version, otherwise you can continue running with the --insecure-validator-i-know-what-i-do
flag.
I would suggest the first option myself, because while containers provide some security, container escapes are rather common. The risk is malicious code stealing your keys. But it's up to you to decide whether you accept the risk, and when running with this flag you will still see warnings to alert you to other missing security features.
I guess you were getting a warning on v1.3.0, it just was not a hard error yet like it is now. If you have the old logs you could double-check that; if the warning was not there, it means it's probably a regression introduced in the recent versions.
I don't remember about that warning on v1.3.0
so I can't tell you. I don't have access to the old logs, unfortunately.
it's only available on Linux 5.13+. If possible, I'd suggest upgrading the Linux version, otherwise you can continue running with the --insecure-validator-i-know-what-i-do flag.
This solution seems achievable, we need to work on our fleet to upgrade to 5.13 !
Thanks for your fast support.
After upgrading from
v1.3.0
tov.1.6.0
the containerexit 1
because of permission denied on unsharing user and mount namespaces.Starting the container with
--insecure-validator-i-know-what-i-do
allows to bypass the error.Kernel version on
ubuntu 20.04
:Docker version:
Container log: