5b99af0079813347d90c935ea540ed7f96dcea38Stéphane Graber# This derives from the global common config
5b99af0079813347d90c935ea540ed7f96dcea38Stéphane Graberlxc.include = @LXCTEMPLATECONFIG@/common.conf
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# Capabilities
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# Uncomment these if you don't run anything that needs the capability, and
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# would like the container to run with less privilege.
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen#
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# Dropping sys_admin disables container root from doing a lot of things
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# that could be bad like re-mounting lxc fstab entries rw for example,
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# but also disables some useful things like being able to nfs mount, and
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# things that are already namespaced with ns_capable() kernel checks, like
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# hostname(1).
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# lxc.cap.drop = sys_admin
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# lxc.cap.drop = net_raw # breaks dhcp/ping
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# lxc.cap.drop = setgid # breaks login (initgroups/setgroups)
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# lxc.cap.drop = dac_read_search # breaks login (pam unix_chkpwd)
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# lxc.cap.drop = setuid # breaks sshd,nfs statd
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# lxc.cap.drop = audit_control # breaks sshd (set_loginuid failed)
9e69977fa6fe9273cbe166cbb7f9cbbd427b5a01Dwight Engen# lxc.cap.drop = audit_write
5b99af0079813347d90c935ea540ed7f96dcea38Stéphane Graberlxc.cap.drop = sys_nice sys_pacct sys_rawio