README: reword id mapping restrictions when unpriv

Suggested-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
This commit is contained in:
Christian Brauner 2017-05-29 06:02:24 +02:00
parent 486e37c80f
commit ac8f64dc73
No known key found for this signature in database
GPG Key ID: 8EB056D53EECB12D

View File

@ -70,10 +70,10 @@ quite restricted. Just to highlight the two most common problems:
inside of the container will not be able to boot up correctly. inside of the container will not be able to boot up correctly.
2. User Namespaces: As outlined above, user namespaces are a big security 2. User Namespaces: As outlined above, user namespaces are a big security
enhancement. However, users which are unprivileged on the host will only be enhancement. However, without relying on privileged helpers users who are
able to establish a mapping for their own UID if they do not rely on unprivileged on the host are only permitted to map their own UID into
privileged helpers. A standard POSIX system however, requires 65536 UIDs and a container. A standard POSIX system however, requires 65536 UIDs and GIDs
GIDs to be available to guarantee full functionality. to be available to guarantee full functionality.
## Configuration ## Configuration