Article 1FTB9 Hertz: Abusing privileged and unprivileged Linux containers

Hertz: Abusing privileged and unprivileged Linux containers

by
corbet
from LWN.net on (#1FTB9)
Thiswhite paper by Jesse Hertz [PDF] examines various ways to compromise andescape from containers on Linux systems. "A common configuration forcompanies offering PaaS solutions built on containers is to have multiplecustomers' containers running on the same physical host. By default, bothLXC and Docker setup container networking so that all containers share thesame Linux virtual bridge. These containers will be able to communicatewith each other. Even if this direct network access is disabled (using the-icc=false flag for Docker, or using iptables rules for LXC), containersaren't restricted for link-layer traffic. In particular, it is possible(and in fact quite easy) to conduct an ARP spoofing attack on anothercontainer within the same host system, allowing full middle-person attacksof the targeted container's traffic."
External Content
Source RSS or Atom Feed
Feed Location http://lwn.net/headlines/rss
Feed Title LWN.net
Feed Link https://lwn.net/
Reply 0 comments