Skip to content

This issue was moved to a discussion.

You can continue the conversation there. Go to discussion →

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is all this Docker encapsulation really required to "sandbox" chiadog? #24

Closed
flotti455 opened this issue Apr 19, 2021 · 3 comments
Closed

Comments

@flotti455
Copy link

As much as I understand chiadog, it should only require read access to INFO-level debug.log and Internet connectivity.

Therefore, in order to encapsulate chiadog from doing any (thankfully / hopefully theoretical) malicious activity, shouldn't it already be enough to run chiadog as a Unix user with limited permissions, e.g. chiadog and setting up debug.log's Unix file permissions with a e.g. group chialog, which User chiadog is a member of?

@martomi
Copy link
Owner

martomi commented Apr 19, 2021

I believe you're right and this would indeed be a simpler solution. At least I'm not aware of any way that a malicious script could circumvent the limitations based on user permissions.

Would you be interested in contributing a step-by-step guide to the README for users less familiar with the unix user permission system?

@Starttoaster
Copy link
Contributor

I agree it's valuable to add instructions on using unix file permissions to sandbox Chiadog without Docker. But IMO it's more common to run services like these in Docker anyway these days, and the pattern for starting a docker container is more familiar to many. Especially to people that aren't Python devs.

@flotti455
Copy link
Author

No, generally it's not more common to do such stuff in Docker these days.

Also keep in mind that Docker is a beast when it comes to using it on a Raspberry Pi farmer, a common thing.

@martomi martomi closed this as completed Apr 27, 2021
Repository owner locked and limited conversation to collaborators Apr 27, 2021

This issue was moved to a discussion.

You can continue the conversation there. Go to discussion →

Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants