Skip to content

Commit 2ca4685

Browse files
committed
Describe a security risk in allowing users writable access to container images
1 parent 683a43f commit 2ca4685

1 file changed

Lines changed: 2 additions & 1 deletion

File tree

pages/docs/admin-docs/docs-security.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,6 @@ allow container extfs = yes
105105
allow container dir = yes
106106
```
107107

108-
109108
### limiting usage to specific container file owners
110109
One benefit of using container images is that they exist on the filesystem as any other file would. This means that POSIX permissions are mandatory. Here you can configure Singularity to only "trust" containers that are owned by a particular set of users.
111110

@@ -119,6 +118,8 @@ One benefit of using container images is that they exist on the filesystem as an
119118
#limit container owners = gmk, singularity, nobody
120119
```
121120

121+
*note: If you are in a high risk security environment, you may want to enable this feature. Trusting container images to users could allow a malicious user to modify an image either before or while being used and cause unexpected behavior from the kernel (e.g. a [DOS attack](https://en.wikipedia.org/wiki/Denial-of-service_attack)). For more information, please see: [https://lwn.net/Articles/652468/](https://lwn.net/Articles/652468/)*
122+
122123
### limiting usage to specific paths
123124
The configuration file also gives you the ability to limit containers to specific paths. This is very useful to ensure that only trusted or blessed container's are being used (it is also beneficial to ensure that containers are only being used on performant file systems).
124125

0 commit comments

Comments
 (0)