git.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Carlo Arenas <carenas@gmail.com>
To: Junio C Hamano <gitster@pobox.com>
Cc: git@vger.kernel.org, bagasdotme@gmail.com,
	phillip.wood123@gmail.com, Johannes.Schindelin@gmx.de,
	"Guy Maurel" <guy.j@maurel.de>,
	"SZEDER Gábor" <szeder.dev@gmail.com>,
	"Randall Becker" <rsbecker@nexbridge.com>
Subject: Re: [PATCH v4 2/3] git-compat-util: avoid failing dir ownership checks if running privileged
Date: Wed, 11 May 2022 00:34:02 -0700	[thread overview]
Message-ID: <CAPUEspiDeDm1p==H+yNq-s1cNyCyo8qOdqE20d7F4MVBi0thHw@mail.gmail.com> (raw)
In-Reply-To: <xmqqv8ud5741.fsf@gitster.g>

On Tue, May 10, 2022 at 3:57 PM Junio C Hamano <gitster@pobox.com> wrote:
> > Because of compatibility with sudo, the code assumes that uid_t is an
> > unsigned integer type (which is not required by the standard) but is used
> > that way in their codebase to generate SUDO_UID.
>
> Heh, that is a good point.

except it is an implementation detail we can't control, and that we
have no way to test for (at least yet and definitely in these series)

just because sudo upstream does this, doesn't mean the sudo that was
built in that specific system does as well, and because strto*l will
silently convert a value from one sign to another it might even "do
the right thing" (tm) even when a signed uid_t exist and a negative
one is valid.

but since we are using a larger integer type to hold those values we
are especially at risk of misbehaving when uid_t is signed because we
didn't want to use atoi (and really couldn't safely).

some systems provide UID_T_MAX as means to figure out (both if it is
signed or not and to truncate safely), and I presume there are others
where you can get that value at runtime with something like getconf(),
but as you pointed out all that is moot if we still run as root so has
been punted from this series and all that is left are these documented
issues, which I meant to get to and fix ASAP (but with changes that
will be more intrusive and wouldn't be safe for maint), but that I
also want to leave clearly visible as bus factor protection.

> > +When git tries to check for ownership of git repositories, it will
> > +obviously do so with the uid of the user that is running git itself,
>
> We do not need "obviously" here, but this has overlap with the
> beginning part of the safe.directory explanation, so I would
> probably suggest rewriting it altogether.

obviously

> > +but if git is running as root, in a platform that provides sudo and is
> > +not Windows, it will check first if it might have been started through
>
> Does Windows provide sudo that leaves the original user in SUDO_UID
> (I doubt it)?  If not, then "on a platform that provides sudo, it will"
> would be sufficient.

At least my windows box does not, but dscho's somehow had and so that
line was added at his request[1] after he wasted so much time trying
to get this to work and realized the function where SUDO_UID logic
resides doesn't even exist in a Windows build.

While I think it is probably ok to go, something that would save
someone else that trouble is probably worth having one way or another,
especially since he wasn't the only one while reviewing[2] this code,
that got it wrong, either.

> > +If that is not what you would prefer and want git to only trust
> > +repositories that are owned by root instead, then you should remove
> > +the `SUDO_UID` variable from root's environment.
>
> s/should/can/.  But otherwise this is excellent.

It weakens the message I wanted to apply to this as being a way to
signal intention, and also being kind of the "official" way to do so
for the future, but I agree it might be premature and it is obviously
not that relevant once the next thing we might add is your code that
fixes the "regression" and allows both root and SUDO_UID to work for
this code.

> > diff --git a/git-compat-util.h b/git-compat-util.h
> > index 63ba89dd31..754cd90d43 100644
> > --- a/git-compat-util.h
> > +++ b/git-compat-util.h
> > @@ -393,12 +393,64 @@ static inline int git_offset_1st_component(const char *path)
> >  #endif
> >
> >  #ifndef is_path_owned_by_current_user
> > +
> > +#ifdef __TANDEM
> > +#define ROOT_UID 65535
> > +#else
> > +#define ROOT_UID 0
> > +#endif
> > +
> > +/*
> > + * This helper function overrides a ROOT_UID with the one provided by
> > + * an environment variable, do not use unless the original user is
> > + * root or could be used as means to escalate to root privileges.
>
> I do not understand the "or could be used ..." at all.  If the
> original user obtained from geteuid() is not root, then no matter
> what we do to *id here in this function, we won't let you gain the
> root privilege.  The system won't let us give you the root privilege
> because we (Git) are running as a normal user.

It is just there to explain the risks of using this function (which is
very visible) somewhere else, as well as to explain why it is only
meant to be used in a process running as root.

> Or do you mean
>
>         Do not use this function when
>
>          (1) geteuid() did not say we are running as 'root', or
>          (2) using this function will compromise the system.
>
> Then I can sort-of understand it, but (2) is a too obvious thing to
> say.

As usual I like your wording of it better, and yes I agree it is
obvious but since this function is very visible (which is not
necessary) and it is going to sit there in several maint releases, it
might not be that all unwarranted IMHO.

> > + * PORTABILITY WARNING:
> > + * This code assumes uid_t is unsigned because that is what sudo does.
> > + * If your uid_t type is signed and all your ids are positive then it
> > + * should all work fine, but need to make sure sudo never generates a
> > + * value higher than what can be represented by your uid_t type or a
> > + * negative value or it will trigger wraparound bugs.
>
> "sudo" generating a value higher than what uid_t can represent in
> SUDO_UID *is* a bug that we shouldn't have to worry about.
> Otherwise "sudo" as a tool would be unusable by folks with higher
> UID on their system.

not necessarily; that system might had decided to use negative uids
instead of changing to unsigned and everything will still work, but
you are correct that in that case sudo printing the uid_t with "%u" is
a bug in that sudo and should be fixed there, but the irony is that if
fixed, would then cause a bug on our side since we assume uid was
always positive and was printed with "%u".

this whole message is there just to try to explain the portability
issue that having signed uid_t might trigger and that would be
unlikely to happen in real life as an alternative to try to do
something about it (like I did in previous versions), or plainly
refusing to run like you proposed (at least NONSTOP seems to have
signed uid_t), specially considering this is in a maint track,

I was thinking it might be something better done (in the future) and
with all the portability bits hidden away in a proper compat file
instead of here.

> In their implementation of "sudo", they must have done getuid(),
> stored the value in uid_t and formatted it into a string.  If they
> lost precision there by wrapping around or truncating, we can do
> nothing about it, but the thing is, we cannot even tell.

exactly, but we can warn the users that the problems they might have
with this feature might be because of that, and the information they
will provide could guide us into implementing a more portable version
of this code in the future.

and meanwhile, they might be able to keep a local patch which would be
really simple to write on their side.

> > + * If that happens the uid used might be incorrect and then trigger
> > + * an access error from the filesystem itself.
>
> If uid we are extracting is incorrect, Git will fail to refuse
> access, the access is done as 'root', and filesystem level safety
> will not trigger.

My bad, I didn't mean that the filesystem will trigger the error, but
that we might fail to match the uid_t we got from the filesystem with
the one we parsed from uid_t and therefore fail to allow access.

Hopefully that mismatch would be easy to spot as well because of a
compiler warning (like -Wsign-compare), or we might get lucky and
might even work (ex: sizeof(long) == sizeof(uid_t))

> The end result is that I run "sudo git describe"
> in your repository and instead of getting refused, because our "sudo"
> was broken and SUDO_UID had your numeric uid, I execute "git" as root
> in your repository.

That shouldn't happen unless the overflow was big enough to trigger an
ERANGE though, which also means uid_t would be much larger than the
expected uint32_t it seems to have almost everywhere I looked.

> IOW, this change is meant to make it slightly convenient to allow
> access to one's own stuff, but it got a bit more convenient by
> allowing me access to my own stuff plus yours ;-)

Well, you said before that since we are running as root you can
already have access to mine so it shouldn't matter ;)

> > + * In the unlikely scenario this happened to you, and that is how you
> > + * got to this message, we would like to know about it by letting us
> > + * now with an email to git@vger.kernel.org indicating which platform,
> > + * you are running on and which version of sudo you used to see if we
> > + * can provide you a patch that would prevent this issue in the future.
>
> Nice.  What message does the reporter see?

when using `sudo git status` a rejection of access to the directory they own

> > + */
> > +static inline void extract_id_from_env(const char *env, uid_t *id)
> > +{
> > +     const char *real_uid = getenv(env);
> > +
> > +     /* discard anything empty to avoid a more complex check below */
> > +     if (real_uid && *real_uid) {
> > +             char *endptr = NULL;
> > +             unsigned long env_id;
> > +
> > +             errno = 0;
> > +             /* silent overflow errors could trigger a bug below */
>
> What "bug" are we referring to?

All of them, the ones we decided to ignore because they are irrelevant
when running as root, and the ones that are documented in the long
paragraph above.

Carlo

[1] https://lore.kernel.org/git/nycvar.QRO.7.76.6.2205051545370.355@tvgsbejvaqbjf.bet/
[2] https://lore.kernel.org/git/CAPUEspitAQrEjMpUyw8e2pyT1MT+h_dO5wSU0wWDWTqSye5TwA@mail.gmail.com/

  reply	other threads:[~2022-05-11  7:34 UTC|newest]

Thread overview: 170+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-04-26 18:31 [RFC PATCH] git-compat-util: avoid failing dir ownership checks if running priviledged Carlo Marcelo Arenas Belón
2022-04-26 19:48 ` Derrick Stolee
2022-04-26 19:56   ` Junio C Hamano
2022-04-26 20:10     ` rsbecker
2022-04-26 20:45       ` Carlo Arenas
2022-04-26 21:10         ` Junio C Hamano
2022-04-26 20:12     ` Carlo Arenas
2022-04-26 20:26   ` Carlo Arenas
2022-04-29 16:16   ` Derrick Stolee
2022-04-27  0:05 ` [PATCH] git-compat-util: avoid failing dir ownership checks if running privileged Carlo Marcelo Arenas Belón
2022-04-27  9:33   ` Phillip Wood
2022-04-27 12:30     ` Phillip Wood
2022-04-27 14:15       ` rsbecker
2022-04-27 15:58       ` Carlo Arenas
2022-04-27 16:14         ` Phillip Wood
2022-04-27 18:54           ` Junio C Hamano
2022-04-27 20:59             ` Carlo Arenas
2022-04-27 21:09               ` rsbecker
2022-04-27 21:25               ` Junio C Hamano
2022-04-28 17:56             ` Phillip Wood
2022-04-27 15:38     ` Carlo Arenas
2022-04-27 15:50       ` rsbecker
2022-04-27 16:19       ` Junio C Hamano
2022-04-27 16:45         ` Carlo Arenas
2022-04-27 17:22         ` Phillip Wood
2022-04-27 17:49           ` rsbecker
2022-04-27 17:54             ` Carlo Arenas
2022-04-27 18:05               ` rsbecker
2022-04-27 18:11                 ` Carlo Arenas
2022-04-27 18:16                   ` rsbecker
2022-04-27 16:31       ` Phillip Wood
2022-04-27 16:54         ` Carlo Arenas
2022-04-27 17:28           ` Phillip Wood
2022-04-27 17:49             ` Carlo Arenas
2022-04-27 22:26   ` [RFC PATCH v2] " Carlo Marcelo Arenas Belón
2022-04-27 22:33     ` Junio C Hamano
2022-04-28  3:35     ` [PATCH 0/2] fix `sudo make install` regression in maint Carlo Marcelo Arenas Belón
2022-04-28  3:35       ` [PATCH 1/2] Documentation: explain how safe.directory works when running under sudo Carlo Marcelo Arenas Belón
2022-04-28  5:17         ` Junio C Hamano
2022-04-28  5:58           ` Carlo Arenas
2022-04-28  6:41             ` Junio C Hamano
2022-04-28  3:35       ` [PATCH 2/2] t: add tests for safe.directory when running with sudo Carlo Marcelo Arenas Belón
2022-04-28  5:34         ` Junio C Hamano
2022-04-28  4:57       ` [PATCH 0/2] fix `sudo make install` regression in maint Junio C Hamano
2022-04-28 10:58       ` [PATCH v2 0/3] " Carlo Marcelo Arenas Belón
2022-04-28 10:58         ` [PATCH v2 1/3] git-compat-util: avoid failing dir ownership checks if running privileged Carlo Marcelo Arenas Belón
2022-04-28 18:02           ` Phillip Wood
2022-04-28 18:57             ` Carlo Arenas
2022-04-28 10:58         ` [PATCH v2 2/3] Documentation: explain how safe.directory works when running under sudo Carlo Marcelo Arenas Belón
2022-04-30  6:17           ` Bagas Sanjaya
2022-04-30  6:39             ` Junio C Hamano
2022-04-30 14:15             ` Carlo Marcelo Arenas Belón
2022-04-28 10:58         ` [PATCH v2 3/3] t: add tests for safe.directory when running with sudo Carlo Marcelo Arenas Belón
2022-04-28 16:55           ` Junio C Hamano
2022-04-28 18:08             ` Phillip Wood
2022-04-28 18:12               ` Junio C Hamano
2022-05-06 17:50                 ` Carlo Arenas
2022-05-06 21:43                   ` Junio C Hamano
2022-05-06 22:57                     ` Carlo Arenas
2022-05-06 23:55                       ` Junio C Hamano
2022-05-07 11:57                         ` Carlo Marcelo Arenas Belón
2022-04-28 19:53             ` rsbecker
2022-04-28 20:22               ` Carlo Arenas
2022-04-28 20:43                 ` rsbecker
2022-04-28 20:51                   ` Junio C Hamano
2022-04-28 20:56                   ` Carlo Arenas
2022-04-28 21:55                     ` rsbecker
2022-04-28 22:21                       ` Junio C Hamano
2022-04-28 22:45                         ` rsbecker
2022-04-28 20:46                 ` Junio C Hamano
2022-04-28 20:32               ` Junio C Hamano
2022-04-28 20:40                 ` rsbecker
2022-04-28 20:48                 ` Carlo Arenas
2022-04-28 21:02             ` Carlo Arenas
2022-04-28 21:07               ` Junio C Hamano
2022-04-29  1:24                 ` Carlo Marcelo Arenas Belón
2022-04-29 18:50                   ` Junio C Hamano
2022-04-29 20:05                     ` Carlo Marcelo Arenas Belón
2022-05-02 18:39         ` [RFC PATCH v3 0/3] fix `sudo make install` regression in maint Carlo Marcelo Arenas Belón
2022-05-02 18:39           ` [RFC PATCH v3 1/3] t: document regression git safe.directory when using sudo Carlo Marcelo Arenas Belón
2022-05-02 21:35             ` Junio C Hamano
2022-05-02 23:07               ` Carlo Arenas
2022-05-02 18:39           ` [RFC PATCH v3 2/3] git-compat-util: avoid failing dir ownership checks if running privileged Carlo Marcelo Arenas Belón
2022-05-02 18:39           ` [RFC PATCH v3 3/3] t0034: enhance framework to allow testing more commands under sudo Carlo Marcelo Arenas Belón
2022-05-02 22:10             ` Junio C Hamano
2022-05-03  0:00               ` Carlo Arenas
2022-05-03  6:54         ` [PATCH v3 0/3] fix `sudo make install` regression in maint Carlo Marcelo Arenas Belón
2022-05-03  6:54           ` [PATCH v3 1/3] t: document regression git safe.directory when using sudo Carlo Marcelo Arenas Belón
2022-05-03 14:03             ` Phillip Wood
2022-05-03 15:56               ` Carlo Marcelo Arenas Belón
2022-05-04 11:15                 ` Phillip Wood
2022-05-04 13:02                   ` Carlo Arenas
2022-05-04 14:11                     ` Phillip Wood
2022-05-05 13:44             ` Johannes Schindelin
2022-05-05 14:34               ` Phillip Wood
2022-05-05 15:50               ` Junio C Hamano
2022-05-05 18:33               ` Junio C Hamano
2022-05-05 19:39                 ` Junio C Hamano
2022-05-06 21:03                   ` Carlo Arenas
2022-05-09  8:21                 ` Phillip Wood
2022-05-09 14:51                   ` Carlo Arenas
2022-05-09 15:18                     ` Phillip Wood
2022-05-09 16:01                   ` Junio C Hamano
2022-05-09 16:21                     ` Carlo Arenas
2022-05-06 17:39               ` Carlo Arenas
2022-05-03  6:54           ` [PATCH v3 2/3] git-compat-util: avoid failing dir ownership checks if running privileged Carlo Marcelo Arenas Belón
2022-05-05 14:01             ` Johannes Schindelin
2022-05-05 14:32               ` Phillip Wood
2022-05-06 19:15                 ` Carlo Arenas
2022-05-06 20:00                   ` Junio C Hamano
2022-05-06 20:22                     ` Carlo Arenas
2022-05-06 20:59                       ` Junio C Hamano
2022-05-06 21:40                         ` Carlo Arenas
2022-05-06 21:07                       ` rsbecker
2022-05-05 16:09               ` Junio C Hamano
2022-05-06 20:02               ` Carlo Arenas
2022-05-03  6:54           ` [PATCH v3 3/3] t0034: enhance framework to allow testing more commands under sudo Carlo Marcelo Arenas Belón
2022-05-03 14:12             ` Phillip Wood
2022-05-03 15:27               ` Junio C Hamano
2022-05-06 16:54               ` Carlo Arenas
2022-05-07 16:35           ` [RFC PATCH v4 0/3] fix `sudo make install` regression in maint Carlo Marcelo Arenas Belón
2022-05-07 16:35             ` [RFC PATCH v4 1/3] t: regression git needs safe.directory when using sudo Carlo Marcelo Arenas Belón
2022-05-07 16:35             ` [RFC PATCH v4 2/3] git-compat-util: avoid failing dir ownership checks if running privileged Carlo Marcelo Arenas Belón
2022-05-07 17:34               ` Junio C Hamano
2022-05-07 18:56                 ` Carlo Marcelo Arenas Belón
2022-05-09 16:54                   ` Junio C Hamano
2022-05-09 17:36                     ` rsbecker
2022-05-09 18:48                     ` Carlo Arenas
2022-05-09 19:16                       ` rsbecker
2022-05-09 19:41                       ` Junio C Hamano
2022-05-07 16:35             ` [RFC PATCH v4 3/3] t0034: add negative tests and allow git init to mostly work under sudo Carlo Marcelo Arenas Belón
2022-05-10 14:17             ` [RFC PATCH v4 0/3] fix `sudo make install` regression in maint Phillip Wood
2022-05-10 15:47               ` Carlo Arenas
2022-05-10 17:46             ` [PATCH " Carlo Marcelo Arenas Belón
2022-05-10 17:46               ` [PATCH v4 1/3] t: regression git needs safe.directory when using sudo Carlo Marcelo Arenas Belón
2022-05-10 22:10                 ` Junio C Hamano
2022-05-10 23:11                   ` Carlo Arenas
2022-05-10 23:44                     ` Junio C Hamano
2022-05-11  0:56                       ` Carlo Arenas
2022-05-11  1:11                         ` Junio C Hamano
2022-05-10 17:46               ` [PATCH v4 2/3] git-compat-util: avoid failing dir ownership checks if running privileged Carlo Marcelo Arenas Belón
2022-05-10 22:57                 ` Junio C Hamano
2022-05-11  7:34                   ` Carlo Arenas [this message]
2022-05-11 14:58                     ` Junio C Hamano
2022-05-10 17:46               ` [PATCH v4 3/3] t0034: add negative tests and allow git init to mostly work under sudo Carlo Marcelo Arenas Belón
2022-05-10 23:11                 ` Junio C Hamano
2022-05-10 23:25                   ` Junio C Hamano
2022-05-11 14:04                   ` Carlo Arenas
2022-05-11 15:29                     ` Junio C Hamano
2022-05-13  1:00               ` [PATCH v5 0/4] fix `sudo make install` regression in maint Carlo Marcelo Arenas Belón
2022-05-13  1:00                 ` [PATCH v5 1/4] t: regression git needs safe.directory when using sudo Carlo Marcelo Arenas Belón
2022-06-03 12:12                   ` SZEDER Gábor
2022-05-13  1:00                 ` [PATCH v5 2/4] git-compat-util: avoid failing dir ownership checks if running privileged Carlo Marcelo Arenas Belón
2022-06-03 11:05                   ` SZEDER Gábor
2022-06-03 16:54                     ` Junio C Hamano
2022-06-03 17:34                       ` SZEDER Gábor
2022-05-13  1:00                 ` [PATCH v5 3/4] t0034: add negative tests and allow git init to mostly work under sudo Carlo Marcelo Arenas Belón
2022-05-13  1:20                   ` Junio C Hamano
2022-05-14 14:36                     ` Carlo Arenas
2022-05-15 16:54                       ` Junio C Hamano
2022-05-15 19:21                         ` Carlo Arenas
2022-05-16  5:27                           ` Junio C Hamano
2022-05-16 13:07                             ` Carlo Marcelo Arenas Belón
2022-05-16 16:25                               ` Junio C Hamano
2022-05-13  1:00                 ` [PATCH v5 4/4] git-compat-util: allow root to access both SUDO_UID and root owned Carlo Marcelo Arenas Belón
2022-06-15 14:02                   ` Johannes Schindelin
2022-06-17 14:26                     ` Carlo Arenas
2022-06-17 16:00                       ` Junio C Hamano
2022-06-17 20:23                   ` [PATCH v6] " Carlo Marcelo Arenas Belón
2022-06-17 21:02                     ` Junio C Hamano

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAPUEspiDeDm1p==H+yNq-s1cNyCyo8qOdqE20d7F4MVBi0thHw@mail.gmail.com' \
    --to=carenas@gmail.com \
    --cc=Johannes.Schindelin@gmx.de \
    --cc=bagasdotme@gmail.com \
    --cc=git@vger.kernel.org \
    --cc=gitster@pobox.com \
    --cc=guy.j@maurel.de \
    --cc=phillip.wood123@gmail.com \
    --cc=rsbecker@nexbridge.com \
    --cc=szeder.dev@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).