Tools like Podman, Docker, Distrobox and Toolbox use custom uid namespaces. I don’t see how they could work with them disabled.
Linux
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Rules
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
- No misinformation
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
With a specific exception only for one software. I would be happy with Flatpak and Podman. Maybe Waydroid and wine too though?
Wine should just work.
Waydroid needs extra support from the kernel that linux-hardend has disabled at compile time. There's a DKMS solution however.
This one? it doesnt mention the hardened kernel at all, is this some obsolete modification not needed in modern Kernels?
binder_linux-dkms
It's an Android thing.
Crazy that it just works on Fedora
That just means they have the feature enabled at compile time. Linux-Zen is the only kernel that has it on Arch.
Basically, you want to not disable kernel.unprivileged_userns_clone
.
For a temporary solution that has to be redone after reboot, there is sysctl kernel.unprivileged_userns_clone=1
.
For a lasting solution, consider echo kernel.unprivileged_userns_clone=1 | sudo tee /etc/sysctl.d/99-enable-unpriv-userns.conf
.
In either case you're foregoing security for the sake of convenience/functionality, so I understand why you would rather not act upon either of them.
I don't know what the solution is that would be analogous to installing bubblewrap-suid
. Perhaps, it's worth exploring the projects found within the github page of Awesome Fedora Security for some pointers.
If you are running things inside of containers you aren’t helping yourself by disabling unprivileged namespaces, you are actually just running more things as root. Inside the containers they generally block namespaces anyway.
TBH I’ve never heard anything positive about most of what hardened does.
I guess I would just disable this one hardening setting like another person recommended.