This repository has been archived by the owner on Jun 21, 2018. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 18
sudo
does not make admins escape from the sandboxes
#74
Labels
Comments
|
KellerFuchs
added a commit
to KellerFuchs/admin-tools
that referenced
this issue
Feb 26, 2017
Using `sudo`, through the Ansible feature `become`, is problematic due to hashbang/shell-etc#74 : sudo does not let Ansible escape the namespace-based sandbox. Since all admins have SSH keys deployed for `root`, this is a good alternative.
What is holding /dev open/in use? |
On Sun, Feb 26, 2017 at 02:47:53PM -0800, daurnimator wrote:
What is holding /dev open/in use?
At least the /dev/pts mountpoint, as mentionned earlier.
|
okay, to go down the rabbit hole: why isn't /dev/pts being umounted first? |
IIRC, I looked in the |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
We are using
pam_namespace
'sunmnt_remnt
option, which should makepam_namespace
perform a namespace switch when changing users.Yet,
sudo
-ing toroot
doesn't make one escape the mount namespaces.However, SSH-ing as
root
gives the expected result (no mount namespaces), so it isn't a misconfiguration on that side.The text was updated successfully, but these errors were encountered: