Skip to content

Conversation

rd235
Copy link

@rd235 rd235 commented Jan 22, 2024

My goal is to use dropbear to log-in into unprivileged network namespaces (like those created by vdens: https://github.com/rd235/vdens )

Dropbear's pty supports fails as in unprivileged namespaces the group ownership of /dev/pty/* is remapped to "nogroup" (instead of "tty").

This patch avoids changing pty's group ownership if it is group owned by "nogroup" (as if it were owned by "tty").

@mkj
Copy link
Owner

mkj commented Apr 2, 2024

I don't think this is correct. It will allow using a pty that is owned by any arbitrary user (in the parent namespace), but then that user in the parent namespace will be able to intercept the tty. At least that's my understanding of it - I'm a bit unclear exactly what the mapping is between namespaces.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants