I'm up and running with PVE v4.1, and I rather like it so far. However, I ran into a little security snag with LXC today, and that made med start to dig a bit more into LXC security, but first the problem that triggered it all.
The problem is that you can view the complete output of the host dmesg from within an LXC guest. I tried the following to no avail:
And then I ran "sysctl -p" to apply the new setting. Sadly, dmesg output still visible from within my guest.
I did some further digging and discovered that this might be related to LXC privilege level, but since I am new to LXC I'm not familiar with this concept. That can be remedied of course, but in the meantime I would like to ask for any and all input I can get in regards to securing LXC in the context of Proxmox. Ideally, I want my LXC guest users to have as much freedom as possible, but without being able to sabotage things for other LXC guests, and certainly without being able to fiddle with the host.
The problem is that you can view the complete output of the host dmesg from within an LXC guest. I tried the following to no avail:
Code:
nano /etc/sysctl.conf
# Add to bottom of file
kernel.dmesg_restrict=1
And then I ran "sysctl -p" to apply the new setting. Sadly, dmesg output still visible from within my guest.
I did some further digging and discovered that this might be related to LXC privilege level, but since I am new to LXC I'm not familiar with this concept. That can be remedied of course, but in the meantime I would like to ask for any and all input I can get in regards to securing LXC in the context of Proxmox. Ideally, I want my LXC guest users to have as much freedom as possible, but without being able to sabotage things for other LXC guests, and certainly without being able to fiddle with the host.