-
Notifications
You must be signed in to change notification settings - Fork 220
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
toolbox won't start with kata runtime #1079
Comments
Hi @jonleivent and thanks for opening the issue! I never used |
I did some testing with podman directly, and the issue is between podman and kata. I don't think podman supports kata. I'm not specifically interested in kata, I just thought it might add some security to toolboxes. I understand that toolbox containers are strictly development-minded containers with no security model, so I'd like some ability to add some security. Granted, the outside OS is ostree-based, and the podman-based containers are unprivileged, but there are other things I'd like to protect from processes I launch from within toolboxes. Can you offer any helpful advice on how to do that? There are two parts: one is hardening the toolbox itself (which is why I tried kata), and another is sandboxing processes launched within the toolbox (such as by using bubblewrap or firejail within a toolbox). As I noted with https://github.com/containers/toolbox/issues/1078, firejail isn't going to work straight up, but maybe there are ways to tweak the inside toolbox filesystem to allow it. I may use bubblewrap, although effectively working with it requires more seccomp know-how than I have at this point. However, it seems that, because toolbox is based on podman, some hardening should be possible by replacing runc or crun with something like kata, gvisor, firecracker, etc., and/or by toolbox providing access to more of podman's own security options. |
Yes, Podman doesn't support Kata. So, as for the topic of this issue, there's nothing Toolbx can do about it other than switching to a different container engine like Docker that supports Kata. However, we don't intend to support multiple container engines. It would be too much work for us to drive features and get bugs fixed across multiple container engines. We would rather have Podman support Kata, assuming there's enough demand for it and it fits the goals of the Podman project. |
As for the security aspect, this is a duplicate of #183 |
Is it at all possible to use kata as a replacement for crun with toolbox? I'm on silverblue. I installed kata-containers, added kata as a runtime with path /usr/bin/kara-runtime in /etc/containers/policy.json, and tried this:
and got:
With crun as the runtime, it works fine. Do I need to use direct podman command equivalents of toolbox with some different options (and which ones?) to run this container with the kata runtime?
The text was updated successfully, but these errors were encountered: