From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751618AbcAZXNd (ORCPT ); Tue, 26 Jan 2016 18:13:33 -0500 Received: from mail-ig0-f173.google.com ([209.85.213.173]:35401 "EHLO mail-ig0-f173.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750925AbcAZXNa (ORCPT ); Tue, 26 Jan 2016 18:13:30 -0500 MIME-Version: 1.0 In-Reply-To: <20160126171523.GA13715@ubuntumail> References: <1453502345-30416-1-git-send-email-keescook@chromium.org> <8737tp0zhr.fsf@x220.int.ebiederm.org> <87bn89sbc2.fsf@x220.int.ebiederm.org> <87zivtj5tv.fsf@x220.int.ebiederm.org> <20160126171523.GA13715@ubuntumail> Date: Tue, 26 Jan 2016 15:13:29 -0800 X-Google-Sender-Auth: agN460JqiCwe1JGn6dYQIQ6AGEk Message-ID: Subject: Re: [kernel-hardening] Re: [PATCH 0/2] sysctl: allow CLONE_NEWUSER to be disabled From: Kees Cook To: Serge Hallyn Cc: "kernel-hardening@lists.openwall.com" , "Eric W. Biederman" , Andy Lutomirski , Andrew Morton , Al Viro , Richard Weinberger , =?UTF-8?B?Um9iZXJ0IMWad2nEmWNraQ==?= , Dmitry Vyukov , David Howells , Kostya Serebryany , Alexander Potapenko , Eric Dumazet , Sasha Levin , "linux-doc@vger.kernel.org" , "linux-kernel@vger.kernel.org" Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 26, 2016 at 9:15 AM, Serge Hallyn wrote: > Quoting Josh Boyer (jwboyer@fedoraproject.org): >> What you're saying is true for the "oh crap" case of a new userns >> related CVE being found. However, there is the case where sysadmins >> know for a fact that a set of machines should not allow user >> namespaces to be enabled. Currently they have 2 choices, 1) use their > > Hi - can you give a specific example of this? (Where users really should > not be able to use them - not where they might not need them) I think > it'll help the discussion tremendously. Because so far the only good > arguments I've seen have been about actual bugs in the user namespaces, > which would not warrant a designed-in permanent disable switch. If > there are good use cases where such a disable switch will always be > needed (and compiling out can't satisfy) that'd be helpful. My example is a machine in a colo rack serving web pages. A site gets attacked, and www-data uses user namespaces to continue their attack to gain root privileges. The admin of such a machine could have disabled userns months earlier and limited the scope of the attack. -Kees -- Kees Cook Chrome OS & Brillo Security