kern/68189 and kern/169751: what jails are allowed to see in a routing socket
David Thiel
lx at FreeBSD.org
Thu Jan 3 21:23:56 UTC 2013
On Thu, Jan 03, 2013 at 10:48:24AM -0700, Jamie Gritton wrote:
> On 01/03/13 02:36, Bjoern A. Zeeb wrote:
> > Meanwhile your suggestion might be ok given simple enough, but I wonder
> > if a different flag would be helpful still. I would not be able to
> > "trust" (the little that is possible anyway) raw_sockets anymore if they
> > suddently could fiddle with the routing table - even read-only, should
> > that really be enough.
> > I would explicitly advertise it as 'do not use - will go away again'
> > feature and it should the moment vnets are declared non-experimental.
>
> Well I'd rather not introduce something as a stopgap. Either this is
> worth doing or it isn't. It does make sense to at least make sure it
> works with VNET.
Hello all,
Thanks for your consideration of the issue.
I don't think it would necessarily have to be a stopgap - I think
something like jail.socket_allow_readroute, default 0, wouldn't hurt
anything and would definitely help some folks, as this issue has arisen
for multiple people over the years.
While I agree that vnets will be a great future solution, I think that
the very existence of unixiproute_only is kind of problematic, as it
implies that jails should be able to use routing sockets by default
(read-only, presumably). If we don't want to allow that, should it at
least be slated to rename/redocument this sysctl at some point in the
future? Or is it intended that VNET totally replace old jail
infrastructure, obviating the need for that sysctl at all?
-David
More information about the freebsd-net
mailing list