-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Figure out if it's possible to run chrooted or unpriviledged #4
Comments
Thanks man , I havn't test it againts an non root user but I think at least users should have ability to run commands as root ( sudo) to the services and install required packages also the current user should be replace with https://github.com/xrp-community/codius-install/blob/master/codius-install.sh#L437 https://github.com/xrp-community/codius-install/blob/master/codius-install.sh#L481 |
I'm thinking it makes sense to create a user for the service. Also, I'm not dictating here. I'm just throwing out what I think could be useful. Anyone is free to shoot this full of holes. I believe the same way nginx often runs as nginx or apache runs as apache. The services could run like this. This is a bit verbose but to be very specific I'll lay it out like this:hyperd should run as hyperd with a group called codius. All of these users should be unprivileged (no sudoer/root privs - maybe even chrooted with systemd-nspawn or something) anything that needs to interoperate between the services could use the group access (currently I think they only communicate through listening ports so I doubt this will be needed). |
We should definitely use whatever requires the least privileges, but it's worth noting that codiusd needs access to add network devices and I believe hyperd also needs root access for certain tasks. The safest thing is to have a machine completely dedicated to codius so that if someone breaks into the machine they wouldn't disrupt anything except the codius host |
@sharafian - I think the primary issue was related to the individual services all being run as root. I am imagining it will just take some iterating and policy configurations to lock these down. @N3TC4T - I'm willing to help out with this effort when I've gotten my own Codius project nailed down. (I think, in a few weeks I could contribute some time to this). |
Saw this over at reddit and thought it was worth nailing down.
https://www.reddit.com/r/codius/comments/8t2h17/simple_script_to_install_codius/
The text was updated successfully, but these errors were encountered: