All of lore.kernel.org
 help / color / mirror / Atom feed
From: Casey Schaufler <casey@schaufler-ca.com>
To: Amir Goldstein <amir@cellrox.com>
Cc: Seth Forshee <seth.forshee@canonical.com>,
	"Theodore Ts'o" <tytso@mit.edu>,
	Stephen Smalley <sds@tycho.nsa.gov>,
	Andy Lutomirski <luto@amacapital.net>,
	"Eric W. Biederman" <ebiederm@xmission.com>,
	Alexander Viro <viro@zeniv.linux.org.uk>,
	Linux FS Devel <linux-fsdevel@vger.kernel.org>,
	LSM List <linux-security-module@vger.kernel.org>,
	SELinux-NSA <selinux@tycho.nsa.gov>,
	Serge Hallyn <serge.hallyn@canonical.com>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	Casey Schaufler <casey@schaufler-ca.com>
Subject: Re: [PATCH 0/7] Initial support for user namespace owned mounts
Date: Fri, 31 Jul 2015 12:56:59 -0700	[thread overview]
Message-ID: <55BBD30B.3000504@schaufler-ca.com> (raw)
In-Reply-To: <CAA2m6vdCmHf1=F=QrjCYEtxdEVMDtp7wKza=vd6Tpv-L9XTqHg@mail.gmail.com>

On 7/31/2015 1:11 AM, Amir Goldstein wrote:
> On Thu, Jul 30, 2015 at 6:33 PM, Casey Schaufler <casey@schaufler-ca.com> wrote:
>> On 7/30/2015 7:47 AM, Amir Goldstein wrote:
>>> On Thu, Jul 30, 2015 at 4:55 PM, Seth Forshee
>>> <seth.forshee@canonical.com> wrote:
>>>> On Thu, Jul 30, 2015 at 07:24:11AM +0300, Amir Goldstein wrote:
>>>>> On Tue, Jul 28, 2015 at 11:40 PM, Seth Forshee
>>>>> <seth.forshee@canonical.com> wrote:
>>>>>> On Wed, Jul 22, 2015 at 05:05:17PM -0700, Casey Schaufler wrote:
>>>>>>>> This is what I currently think you want for user ns mounts:
>>>>>>>>
>>>>>>>>  1. smk_root and smk_default are assigned the label of the backing
>>>>>>>>     device.
>>>>> Seth,
>>>>>
>>>>> There were 2 main concerns discussed in this thread:
>>>>> 1. trusting LSM labels outside the namespace
>>>>> 2. trusting the content of the image file/loopdev
>>>>>
>>>>> While your approach addresses the first concern, I suspect it may be placing
>>>>> an obstacle in a way for resolving the second concern.
>>>>>
>>>>> A viable security policy to mitigate the second concern could be:
>>>>> - Allow only trusted programs (e.g. mkfs, fsck) to write to 'Loopback' images
>>>>> - Allow mount only of 'Loopback' images
>>>>>
>>>>> This should allow the system as a whole to trust unprivileged mounts based on
>>>>> the trust of the entities that had raw access the the fs layout.
>>>> You don't really say what you mean by "trusted" programs. In a container
>>>> context I'd have to assume that you mean suid-root or similar programs
>>>> shared into the container by the host. In that case is any new kernel
>>>> functionality even required?
>>> Sorry I was not clear. I will try to explain better.
>>> I meant that the programs are "trusted" by the LSM security policy.
>>> I envisioned a system where unprivileged user is allowed to spawn
>>> a container which contains "trusted" programs (e.g. mkfs) that are labeled
>>> as 'FileSystemTools' by the admin of the host.
>>> FileSystemTools are allowed to write into Loopback labeled files.
>> You could do this on a Smack based system. It would require
>> CAP_MAC_ADMIN and CAP_MAC_OVERRIDE to set up. You would need
>> to set some SMACK64EXEC labels on your FileSystemTools, and
>> they would have to be written as carefully as the would if they
>> had "more" privilege. You'd need to designate a repository for
>> your loopback files. On the whole, it would be unattractive.
>> I will pass on providing the details for fear someone will like
>> it well enough to implement.
>>
>>>> That also doesn't work for some of our use cases, where we'd like to be
>>>> able to do something like "mount -o loop foo.img /mnt/foo" in an
>>>> unprivileged container where foo.img is not created on the local machine
>>>> and not fully under control of the host environment.
>>> That use case will not be addressed by the policy I suggested,
>>> but the more common case of:
>>> - create a loopback file
>>> - mkfs
>>> - mount
>>> will be addressed.
>>>
>>> So if the (host) admin of the system trusts that unprivileged user cannot create
>>> a malicious fs layout using mkfs and fsck alone, then the system is
>>> relatively safe
>>> mounting (non fuse) file systems from loopback files.
>>> IMHO, this statement is going to be easier for Ted to sign.
>> But that sort of defeats the purpose of unprivileged mounts.
>> Or rather, you're trying to place restrictions on what an
>> unprivileged user can do without calling the ability to
>> violate those restrictions "privilege".
> I don't understand your concern.

My concern is that you're playing a shell game. Allow unprivileged
mounts, but only of things that where created using privilege. How
is that better than requiring privilege to do the mount?

> I am saying that LSM can come to the rescue, in a use case that
> many have been considering as unsolvable (i.e. the loopback tampering).
>
> Yes, I am trying to place restrictions on what an unprivileged user can do.
> As it stands right now, user is about to gain the ability to mount FUSE.
> With some extra care on crafting the policy and without any extra code,
> user can gain the ability to mount "trusted loopback files".
> It does not solve all use cases, but it does solve a handful.

As I said, you can do this, but it will be ugly, and people won't
understand how to use it correctly. The distance between the "trusted"
creation of the filesystem and the "untrusted" mount is too great.
Plus, there are too many ways to circumvent the integrity of your
"trusted" filesystem.

> Anyway, the concern I was raising was about the fact that if files inside
> the loopback mount inherit the label of the loopback file, this policy is
> going to be impossible to write.
> But Stephan has already proposed an alternative to this implicit inherit rule
> on [PATCH 6/7] thread, so I withdraw my concern.

What Stephan has proposed is dandy for SELinux.

>
>
>>>> Agreed though that the "attack from below" problem for untrusted
>>>> filesystems is still an open question. At minimum we have fuse, which
>>>> has been designed to protect against this threat. Others have mentioned
>>>> on this thread that Ted had said something at kernel summit last year
>>>> about being willing to support ext4 mounts from unprivileged user
>>>> namespaces as well. I've added Ted to the Cc in case he wants to confirm
>>>> or deny this rumor.
>>>>
>>>>> Alas, if you choose to propagate the backing dev label to contained files,
>>>>> they would all share the designated 'Loopback' label and render the policy above
>>>>> useless.
>>>>>
>>>>> Any thoughts on how to reconcile this conflict?
>>>> I'm not seeing what the conflict is here - nothing you proposed says
>>>> anything about security labels in the filesystem, and nothing would
>>>> prevent a "trusted" program with CAP_MAC_ADMIN from setting whatever
>>>> label was desired on the backing device. Care to elaborate?
>>>>
>>>> Seth


WARNING: multiple messages have this Message-ID (diff)
From: Casey Schaufler <casey@schaufler-ca.com>
To: Amir Goldstein <amir@cellrox.com>
Cc: Serge Hallyn <serge.hallyn@canonical.com>,
	Theodore Ts'o <tytso@mit.edu>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	Andy Lutomirski <luto@amacapital.net>,
	Seth Forshee <seth.forshee@canonical.com>,
	LSM List <linux-security-module@vger.kernel.org>,
	SELinux-NSA <selinux@tycho.nsa.gov>,
	Linux FS Devel <linux-fsdevel@vger.kernel.org>,
	Stephen Smalley <sds@tycho.nsa.gov>,
	Alexander Viro <viro@zeniv.linux.org.uk>
Subject: Re: [PATCH 0/7] Initial support for user namespace owned mounts
Date: Fri, 31 Jul 2015 12:56:59 -0700	[thread overview]
Message-ID: <55BBD30B.3000504@schaufler-ca.com> (raw)
In-Reply-To: <CAA2m6vdCmHf1=F=QrjCYEtxdEVMDtp7wKza=vd6Tpv-L9XTqHg@mail.gmail.com>

On 7/31/2015 1:11 AM, Amir Goldstein wrote:
> On Thu, Jul 30, 2015 at 6:33 PM, Casey Schaufler <casey@schaufler-ca.com> wrote:
>> On 7/30/2015 7:47 AM, Amir Goldstein wrote:
>>> On Thu, Jul 30, 2015 at 4:55 PM, Seth Forshee
>>> <seth.forshee@canonical.com> wrote:
>>>> On Thu, Jul 30, 2015 at 07:24:11AM +0300, Amir Goldstein wrote:
>>>>> On Tue, Jul 28, 2015 at 11:40 PM, Seth Forshee
>>>>> <seth.forshee@canonical.com> wrote:
>>>>>> On Wed, Jul 22, 2015 at 05:05:17PM -0700, Casey Schaufler wrote:
>>>>>>>> This is what I currently think you want for user ns mounts:
>>>>>>>>
>>>>>>>>  1. smk_root and smk_default are assigned the label of the backing
>>>>>>>>     device.
>>>>> Seth,
>>>>>
>>>>> There were 2 main concerns discussed in this thread:
>>>>> 1. trusting LSM labels outside the namespace
>>>>> 2. trusting the content of the image file/loopdev
>>>>>
>>>>> While your approach addresses the first concern, I suspect it may be placing
>>>>> an obstacle in a way for resolving the second concern.
>>>>>
>>>>> A viable security policy to mitigate the second concern could be:
>>>>> - Allow only trusted programs (e.g. mkfs, fsck) to write to 'Loopback' images
>>>>> - Allow mount only of 'Loopback' images
>>>>>
>>>>> This should allow the system as a whole to trust unprivileged mounts based on
>>>>> the trust of the entities that had raw access the the fs layout.
>>>> You don't really say what you mean by "trusted" programs. In a container
>>>> context I'd have to assume that you mean suid-root or similar programs
>>>> shared into the container by the host. In that case is any new kernel
>>>> functionality even required?
>>> Sorry I was not clear. I will try to explain better.
>>> I meant that the programs are "trusted" by the LSM security policy.
>>> I envisioned a system where unprivileged user is allowed to spawn
>>> a container which contains "trusted" programs (e.g. mkfs) that are labeled
>>> as 'FileSystemTools' by the admin of the host.
>>> FileSystemTools are allowed to write into Loopback labeled files.
>> You could do this on a Smack based system. It would require
>> CAP_MAC_ADMIN and CAP_MAC_OVERRIDE to set up. You would need
>> to set some SMACK64EXEC labels on your FileSystemTools, and
>> they would have to be written as carefully as the would if they
>> had "more" privilege. You'd need to designate a repository for
>> your loopback files. On the whole, it would be unattractive.
>> I will pass on providing the details for fear someone will like
>> it well enough to implement.
>>
>>>> That also doesn't work for some of our use cases, where we'd like to be
>>>> able to do something like "mount -o loop foo.img /mnt/foo" in an
>>>> unprivileged container where foo.img is not created on the local machine
>>>> and not fully under control of the host environment.
>>> That use case will not be addressed by the policy I suggested,
>>> but the more common case of:
>>> - create a loopback file
>>> - mkfs
>>> - mount
>>> will be addressed.
>>>
>>> So if the (host) admin of the system trusts that unprivileged user cannot create
>>> a malicious fs layout using mkfs and fsck alone, then the system is
>>> relatively safe
>>> mounting (non fuse) file systems from loopback files.
>>> IMHO, this statement is going to be easier for Ted to sign.
>> But that sort of defeats the purpose of unprivileged mounts.
>> Or rather, you're trying to place restrictions on what an
>> unprivileged user can do without calling the ability to
>> violate those restrictions "privilege".
> I don't understand your concern.

My concern is that you're playing a shell game. Allow unprivileged
mounts, but only of things that where created using privilege. How
is that better than requiring privilege to do the mount?

> I am saying that LSM can come to the rescue, in a use case that
> many have been considering as unsolvable (i.e. the loopback tampering).
>
> Yes, I am trying to place restrictions on what an unprivileged user can do.
> As it stands right now, user is about to gain the ability to mount FUSE.
> With some extra care on crafting the policy and without any extra code,
> user can gain the ability to mount "trusted loopback files".
> It does not solve all use cases, but it does solve a handful.

As I said, you can do this, but it will be ugly, and people won't
understand how to use it correctly. The distance between the "trusted"
creation of the filesystem and the "untrusted" mount is too great.
Plus, there are too many ways to circumvent the integrity of your
"trusted" filesystem.

> Anyway, the concern I was raising was about the fact that if files inside
> the loopback mount inherit the label of the loopback file, this policy is
> going to be impossible to write.
> But Stephan has already proposed an alternative to this implicit inherit rule
> on [PATCH 6/7] thread, so I withdraw my concern.

What Stephan has proposed is dandy for SELinux.

>
>
>>>> Agreed though that the "attack from below" problem for untrusted
>>>> filesystems is still an open question. At minimum we have fuse, which
>>>> has been designed to protect against this threat. Others have mentioned
>>>> on this thread that Ted had said something at kernel summit last year
>>>> about being willing to support ext4 mounts from unprivileged user
>>>> namespaces as well. I've added Ted to the Cc in case he wants to confirm
>>>> or deny this rumor.
>>>>
>>>>> Alas, if you choose to propagate the backing dev label to contained files,
>>>>> they would all share the designated 'Loopback' label and render the policy above
>>>>> useless.
>>>>>
>>>>> Any thoughts on how to reconcile this conflict?
>>>> I'm not seeing what the conflict is here - nothing you proposed says
>>>> anything about security labels in the filesystem, and nothing would
>>>> prevent a "trusted" program with CAP_MAC_ADMIN from setting whatever
>>>> label was desired on the backing device. Care to elaborate?
>>>>
>>>> Seth

  reply	other threads:[~2015-07-31 19:57 UTC|newest]

Thread overview: 138+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-07-31  8:11 [PATCH 0/7] Initial support for user namespace owned mounts Amir Goldstein
2015-07-31  8:11 ` Amir Goldstein
2015-07-31 19:56 ` Casey Schaufler [this message]
2015-07-31 19:56   ` Casey Schaufler
2015-08-01 17:01   ` Amir Goldstein
2015-08-01 17:01     ` Amir Goldstein
  -- strict thread matches above, loose matches on Subject: below --
2015-07-30  4:24 Amir Goldstein
2015-07-30  4:24 ` Amir Goldstein
2015-07-30 13:55 ` Seth Forshee
2015-07-30 13:55   ` Seth Forshee
2015-07-30 14:47   ` Amir Goldstein
2015-07-30 14:47     ` Amir Goldstein
2015-07-30 15:33     ` Casey Schaufler
2015-07-30 15:33       ` Casey Schaufler
2015-07-30 15:52       ` Colin Walters
2015-07-30 15:52         ` Colin Walters
2015-07-30 16:15         ` Eric W. Biederman
2015-07-30 16:15           ` Eric W. Biederman
2015-07-30 13:57 ` Serge Hallyn
2015-07-30 13:57   ` Serge Hallyn
2015-07-30 15:09   ` Amir Goldstein
2015-07-30 15:09     ` Amir Goldstein
2015-07-15 19:46 Seth Forshee
2015-07-15 19:46 ` Seth Forshee
2015-07-15 20:36 ` Casey Schaufler
2015-07-15 20:36   ` Casey Schaufler
2015-07-15 21:06   ` Eric W. Biederman
2015-07-15 21:06     ` Eric W. Biederman
2015-07-15 21:48     ` Seth Forshee
2015-07-15 21:48       ` Seth Forshee
2015-07-15 22:28       ` Eric W. Biederman
2015-07-15 22:28         ` Eric W. Biederman
2015-07-16  1:05         ` Andy Lutomirski
2015-07-16  1:05           ` Andy Lutomirski
2015-07-16  2:20           ` Eric W. Biederman
2015-07-16  2:20             ` Eric W. Biederman
2015-07-16 13:12           ` Stephen Smalley
2015-07-16 13:12             ` Stephen Smalley
2015-07-15 23:04       ` Casey Schaufler
2015-07-15 23:04         ` Casey Schaufler
2015-07-15 22:39     ` Casey Schaufler
2015-07-15 22:39       ` Casey Schaufler
2015-07-16  1:08       ` Andy Lutomirski
2015-07-16  1:08         ` Andy Lutomirski
2015-07-16  2:54         ` Casey Schaufler
2015-07-16  2:54           ` Casey Schaufler
2015-07-16  4:47           ` Eric W. Biederman
2015-07-16  4:47             ` Eric W. Biederman
2015-07-17  0:09             ` Dave Chinner
2015-07-17  0:09               ` Dave Chinner
2015-07-17  0:42               ` Eric W. Biederman
2015-07-17  0:42                 ` Eric W. Biederman
2015-07-17  2:47                 ` Dave Chinner
2015-07-17  2:47                   ` Dave Chinner
2015-07-21 17:37                   ` J. Bruce Fields
2015-07-21 17:37                     ` J. Bruce Fields
2015-07-22  7:56                     ` Dave Chinner
2015-07-22  7:56                       ` Dave Chinner
2015-07-22 14:09                       ` J. Bruce Fields
2015-07-22 14:09                         ` J. Bruce Fields
2015-07-22 16:52                         ` Austin S Hemmelgarn
2015-07-22 16:52                           ` Austin S Hemmelgarn
2015-07-22 17:41                           ` J. Bruce Fields
2015-07-22 17:41                             ` J. Bruce Fields
2015-07-23  1:51                             ` Dave Chinner
2015-07-23  1:51                               ` Dave Chinner
2015-07-23 13:19                               ` J. Bruce Fields
2015-07-23 13:19                                 ` J. Bruce Fields
2015-07-23 23:48                                 ` Dave Chinner
2015-07-23 23:48                                   ` Dave Chinner
2015-07-18  0:07                 ` Serge E. Hallyn
2015-07-18  0:07                   ` Serge E. Hallyn
2015-07-20 17:54             ` Colin Walters
2015-07-20 17:54               ` Colin Walters
2015-07-16 11:16     ` Lukasz Pawelczyk
2015-07-16 11:16       ` Lukasz Pawelczyk
2015-07-17  0:10       ` Eric W. Biederman
2015-07-17  0:10         ` Eric W. Biederman
2015-07-17 10:13         ` Lukasz Pawelczyk
2015-07-17 10:13           ` Lukasz Pawelczyk
2015-07-16  3:15 ` Eric W. Biederman
2015-07-16  3:15   ` Eric W. Biederman
2015-07-16 13:59   ` Seth Forshee
2015-07-16 13:59     ` Seth Forshee
2015-07-16 15:09     ` Casey Schaufler
2015-07-16 15:09       ` Casey Schaufler
2015-07-16 18:57       ` Seth Forshee
2015-07-16 18:57         ` Seth Forshee
2015-07-16 21:42         ` Casey Schaufler
2015-07-16 21:42           ` Casey Schaufler
2015-07-16 22:27           ` Andy Lutomirski
2015-07-16 22:27             ` Andy Lutomirski
2015-07-16 23:08             ` Casey Schaufler
2015-07-16 23:08               ` Casey Schaufler
2015-07-16 23:29               ` Andy Lutomirski
2015-07-16 23:29                 ` Andy Lutomirski
2015-07-17  0:45                 ` Casey Schaufler
2015-07-17  0:45                   ` Casey Schaufler
2015-07-17  0:59                   ` Andy Lutomirski
2015-07-17  0:59                     ` Andy Lutomirski
2015-07-17 14:28                     ` Serge E. Hallyn
2015-07-17 14:28                       ` Serge E. Hallyn
2015-07-17 14:56                       ` Seth Forshee
2015-07-17 14:56                         ` Seth Forshee
2015-07-21 20:35                     ` Seth Forshee
2015-07-21 20:35                       ` Seth Forshee
2015-07-22  1:52                       ` Casey Schaufler
2015-07-22  1:52                         ` Casey Schaufler
2015-07-22 15:56                         ` Seth Forshee
2015-07-22 15:56                           ` Seth Forshee
2015-07-22 18:10                           ` Casey Schaufler
2015-07-22 18:10                             ` Casey Schaufler
2015-07-22 19:32                             ` Seth Forshee
2015-07-22 19:32                               ` Seth Forshee
2015-07-23  0:05                               ` Casey Schaufler
2015-07-23  0:05                                 ` Casey Schaufler
2015-07-23  0:15                                 ` Eric W. Biederman
2015-07-23  0:15                                   ` Eric W. Biederman
2015-07-23  5:15                                   ` Seth Forshee
2015-07-23  5:15                                     ` Seth Forshee
2015-07-23 21:48                                   ` Casey Schaufler
2015-07-23 21:48                                     ` Casey Schaufler
2015-07-28 20:40                                 ` Seth Forshee
2015-07-28 20:40                                   ` Seth Forshee
2015-07-30 16:18                                   ` Casey Schaufler
2015-07-30 16:18                                     ` Casey Schaufler
2015-07-30 17:05                                     ` Eric W. Biederman
2015-07-30 17:05                                       ` Eric W. Biederman
2015-07-30 17:25                                       ` Seth Forshee
2015-07-30 17:25                                         ` Seth Forshee
2015-07-30 17:33                                         ` Eric W. Biederman
2015-07-30 17:33                                           ` Eric W. Biederman
2015-07-17 13:21           ` Seth Forshee
2015-07-17 13:21             ` Seth Forshee
2015-07-17 17:14             ` Casey Schaufler
2015-07-17 17:14               ` Casey Schaufler
2015-07-16 15:59     ` Seth Forshee
2015-07-16 15:59       ` Seth Forshee

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=55BBD30B.3000504@schaufler-ca.com \
    --to=casey@schaufler-ca.com \
    --cc=amir@cellrox.com \
    --cc=ebiederm@xmission.com \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=luto@amacapital.net \
    --cc=sds@tycho.nsa.gov \
    --cc=selinux@tycho.nsa.gov \
    --cc=serge.hallyn@canonical.com \
    --cc=seth.forshee@canonical.com \
    --cc=tytso@mit.edu \
    --cc=viro@zeniv.linux.org.uk \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.