|
|
Subscribe / Log in / New account

LXC 1.0 released

From:  Stéphane Graber <stgraber-AT-ubuntu.com>
To:  lxc-devel-AT-lists.linuxcontainers.org, lxc-users-AT-lists.linuxcontainers.org, containers-AT-lists.linux-foundation.org
Subject:  LXC 1.0 has been released!
Date:  Thu, 20 Feb 2014 14:20:09 -0500
Message-ID:  <20140220192009.GT2689@castiana>

Hello everyone,

It's with great pleasure that the LXC development team is announcing
the release of LXC 1.0!

This release is a significant milestone for us as it is the first
release we consider to be production ready.  It is also the fruit of 10
months of effort by over 60 different contributors (over 1000 commits).

LXC 1.0 features a wide variety of improvements to container security, a
consistent set of tools, updated documentation and an API with multiple
bindings.  We are confident that this is the best LXC release yet and
that our users will find it reliable and easy to use.

A series of blog posts on LXC and LXC 1.0 features is also available:
https://www.stgraber.org/2013/12/20/lxc-1-0-blog-post-series

We intend to provide bugfix and security updates on this release for the
coming 5 years, cherry-picking and backporting fixes from our master
branch as they come.  We will also do further releases in the 1.0 series
as those fixes start to accumulate in our stable branch.

A detailed release announcement may be found here:
https://linuxcontainers.org/news

The release tarballs may be found at https://linuxcontainers.org/downloads
or you may just wait a few days for your favorite distribution to
package this new LXC release.

Our git repository and bug tracker are on Github: https://github.com/lxc/lxc

Additional information on LXC itself may be found on our website:
https://linuxcontainers.org

And we have mailing-lists for user questions and for development (patches):
https://lists.linuxcontainers.org

We hope you'll enjoy this new release as much as we do!

Stéphane Graber
On behalf of the LXC development team



to post comments

LXC 1.0 released

Posted Feb 21, 2014 16:35 UTC (Fri) by arekm (guest, #4846) [Link] (10 responses)

Is there a way to hide guest processes from host view in LXC? Something like linux vserver does? (so no one could accidentally kill guest processes from host).

LXC 1.0 released

Posted Feb 21, 2014 16:48 UTC (Fri) by stgraber (subscriber, #57367) [Link]

No, unfortunately the kernel doesn't have a facility to hide processes which are running in a different PID namespace. The closest thing that exists is the "hidepid" mount option for the proc filesystem but it's about hiding processes of other users, not those from other namespaces.

I guess a patch adding another option to the proc filesystem allowing you to hide those processes would be fine, though I'm not sure of the exact consequences this would have on the various userspace tools.

LXC 1.0 released

Posted Feb 21, 2014 18:34 UTC (Fri) by dowdle (subscriber, #659) [Link] (4 responses)

Some folks used modified ps programs on their host nodes that only show host node processes. Where you can find such a thing, I don't know.

LXC 1.0 released

Posted Feb 21, 2014 18:42 UTC (Fri) by arekm (guest, #4846) [Link] (3 responses)

Hacks are not worth considering for such thing as LXC. It should be reliable etc.

Anyway I miss this feature...

LXC 1.0 released

Posted Feb 21, 2014 19:05 UTC (Fri) by hamjudo (guest, #363) [Link] (2 responses)

I'm probably missing something important here, but it seems like a slight change to how you work would make this "problem" go away. Feel free to enlighten me on what I'm missing.

The only problem here is that parent namespaces can see into their children's namespaces. A child can't see the parent's namespace or their sibling's.

Use the parent namespace only for creating children. Do all of the dangerous work in a child container. Where "dangerous" means, any time you might send a signal to the wrong process.

LXC 1.0 released

Posted Feb 22, 2014 3:03 UTC (Sat) by drag (guest, #31333) [Link] (1 responses)

> Use the parent namespace only for creating children.

This.

For security and sanity sake any sort of vm host running important guests should be kept as minimal as possible. Nobody should be logging into it all once it is setup.

LXC 1.0 released

Posted Feb 22, 2014 5:56 UTC (Sat) by deepfire (guest, #26138) [Link]

> For security and sanity sake any sort of vm host running important guests
> should be kept as minimal as possible.

It appears to me that container virtualisation is hopeless wrt. security -- its attack surface is more or less the whole kernel -- without the clear (and, even so, still problematic) syscall boundary.

LXC 1.0 released

Posted Feb 21, 2014 23:58 UTC (Fri) by ebiederm (subscriber, #35028) [Link] (3 responses)

Run your containers as a different user?

Unless you are looking for rootkits made easy I don't see the value in making processes unkillable by root. What am I missing?

LXC 1.0 released

Posted Feb 22, 2014 3:05 UTC (Sat) by drag (guest, #31333) [Link]

He just has a feature he is used to with vserver. It's not unreasonable to assume that lxc should have it to since it's suppose to be a superior product.

LXC 1.0 released

Posted Feb 22, 2014 20:37 UTC (Sat) by clopez (guest, #66009) [Link] (1 responses)

With vserver the guest pids can be killed from the host. The difference is that guest pids are hidden.

ps on the host will only show host pids, but you have the tool vps that shows also guest pids

linux-vserver: host visibility into guest

Posted Feb 23, 2014 2:11 UTC (Sun) by undefined (guest, #40876) [Link]

to elaborate, for those unfamiliar with linux-vserver...

the "host" processes reside in context 0, from which you cannot see processes/threads in other contexts. privileged processes (can't remember if it is just "root" or tied to a capability) in context 0 can enter context 1, from which all the processes/threads can be seen, a management context of sorts.

there's even a wrapper, "chcontext" from util-vserver, that can execute commands in any context which i use on the host for executing htop and iotop in context 1 for having system-wide visibility.

LXC 1.0 released

Posted Feb 21, 2014 16:37 UTC (Fri) by Wummel (guest, #7591) [Link] (1 responses)

Cool, now all I need is Docker 1.0 :-)

LXC 1.0 released

Posted Feb 21, 2014 21:41 UTC (Fri) by Lennie (subscriber, #49641) [Link]

CRIU also reached 1.0.

LXC 1.0 released

Posted Feb 22, 2014 9:30 UTC (Sat) by littlesandra88 (guest, #64017) [Link] (1 responses)

Have the security problems been fixed, so it is no longer possible for a LXC root user to modify outside the container?

Such an example is this

http://blog.bofh.it/debian/id_413

LXC 1.0 released

Posted Feb 22, 2014 18:08 UTC (Sat) by richard_weinberger (subscriber, #38938) [Link]

You have to use user namespaces.

Systemd sharing?

Posted Feb 22, 2014 10:38 UTC (Sat) by lbt (subscriber, #29672) [Link]

As a happy systemd user I'm interested in how this will work in a systemd booted system?
I have some systems which are not systemd and using lxc on all of them would be useful.


Copyright © 2014, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds