[CLOSED] ip-fou (Foo-over-UDP) on unprivileged container

rapdodge

New Member
May 2, 2024
5
0
1
Hello there!

I have an issue with my LXC container about networking things.
So, I've wanted to run ip-fou (Foo-over-UDP) on my unprivileged container, and there is kind of an error message "RTNETLINK answers: Operation not permitted"

image.png


And this is my LXC configuration file

image.png


Besides of it, I'm using this hookscript too, and of course, I've already adding modprobe fou

image.png


Any idea to make it works on unprivileged container?

Thanks!
 
Containers share the kernel with the Proxmox host and unprivileged containers are design to prevent stuff like that. Kernel modules need to be loaded on the Proxmox host and you need to find out which dev-nodes you need to pass to the container. Maybe it's much easier to run that in a full VM?
 
Containers share the kernel with the Proxmox host and unprivileged containers are design to prevent stuff like that. Kernel modules need to be loaded on the Proxmox host and you need to find out which dev-nodes you need to pass to the container. Maybe it's much easier to run that in a full VM?
The host already modprobe too... I've already tried tutorial how to make openvpn working on the unprivileged container, doesn't working too :(
 
The host already modprobe too... I've already tried tutorial how to make openvpn working on the unprivileged container, doesn't working too :(
Sorry, I did not realize that it was a hookscript. Maybe use the new way of passing dev-nodes: dev0: /dev/ppp,gid=0,uid=0 dev1: /dev/net/tun,gid=0,uid=0, instead of the lxc.mount.entry etc.
 
Sorry, I did not realize that it was a hookscript. Maybe use the new way of passing dev-nodes: dev0: /dev/ppp,gid=0,uid=0 dev1: /dev/net/tun,gid=0,uid=0, instead of the lxc.mount.entry etc.
Hmmm, already change lxc.mount.entry into dev-nodes, still the same, "RTNETLINK answers: Operation not permitted"
 
Netlink sockets are used to communicate between user space and the kernel. Systemd for example uses one to get notified when new devices are attached. I would be surprised if that was allowed in an unprivileged container.
 
Last edited:
Netlink sockets are used to communicate between user space and the kernel. Systemd for example uses one to get notified when new devices are attached. I would be surprised if that was allowed in an unprivileged container.
So, is that not possible to doing it on unprivileged container?
So, I need to make it privilege or make it to be a VM?
 
So, is that not possible to doing it on unprivileged container?
So, I need to make it privilege or make it to be a VM?
That's what I'm saying. I do not know 100% for certain if it is correct but like I said it would be surprising to allow a non-root user to send messages on a netlink socket (receiving might be ok). Since root in an unprivileged container is really just some user to the kernel sending such a message should be disallowed.

But regardless of that I think you have to ask yourself if it makes sense to load a bunch of kernel modules to support one container. What does a container actually buy you compared to running on the host directly or in a VM?
 
Last edited:
That's what I'm saying. I do not know 100% for certain if it is correct but like I said it would be surprising to allow a non-root user to send messages on a netlink socket (receiving might be ok). Since root in an unprivileged container is really just some user to the kernel sending such a message should be disallowed.

But regardless of that I think you have to ask yourself if it makes sense to load a bunch of kernel modules to support one container. What does a container actually buy you compared to running on the host directly or in a VM?
Ummm... So, I've wanted to make it very efficient... Since I don't have much resources (I'm using HP ThinClient T620 Plus (4C4T))

Thank you for your response... I think I'm just make it as closed post...
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!