From: Alexei Starovoitov <firstname.lastname@example.org> To: Andy Lutomirski <email@example.com> Cc: Daniel Colascione <firstname.lastname@example.org>, Song Liu <email@example.com>, Kees Cook <firstname.lastname@example.org>, Networking <email@example.com>, bpf <firstname.lastname@example.org>, Alexei Starovoitov <email@example.com>, Daniel Borkmann <firstname.lastname@example.org>, Kernel Team <Kernelemail@example.com>, Lorenz Bauer <firstname.lastname@example.org>, Jann Horn <email@example.com>, Greg KH <firstname.lastname@example.org>, Linux API <email@example.com>, LSM List <firstname.lastname@example.org> Subject: Re: [PATCH v2 bpf-next 1/4] bpf: unprivileged BPF access via /dev/bpf Date: Wed, 14 Aug 2019 15:05:46 -0700 Message-ID: <email@example.com> (raw) In-Reply-To: <CALCETrUkqUprujww26VxHwkdXQ3DWJH8nnL2VBYpK2EU0oX_YA@mail.gmail.com> On Wed, Aug 14, 2019 at 10:51:23AM -0700, Andy Lutomirski wrote: > > If eBPF is genuinely not usable by programs that are not fully trusted > by the admin, then no kernel changes at all are needed. Programs that > want to reduce their own privileges can easily fork() a privileged > subprocess or run a little helper to which they delegate BPF > operations. This is far more flexible than anything that will ever be > in the kernel because it allows the helper to verify that the rest of > the program is doing exactly what it's supposed to and restrict eBPF > operations to exactly the subset that is needed. So a container > manager or network manager that drops some provilege could have a > little bpf-helper that manages its BPF XDP, firewalling, etc > configuration. The two processes would talk over a socketpair. there were three projects that tried to delegate bpf operations. All of them failed. bpf operational workflow is much more complex than you're imagining. fork() also doesn't work for all cases. I gave this example before: consider multiple systemd-like deamons that need to do bpf operations that want to pass this 'bpf capability' to other deamons written by other teams. Some of them will start non-root, but still need to do bpf. They will be rpm installed and live upgraded while running. We considered to make systemd such centralized bpf delegation authority too. It didn't work. bpf in kernel grows quickly. libbpf part grows independently. llvm keeps evolving. All of them are being changed while system overall has to stay operational. Centralized approach breaks apart. > The interesting cases you're talking about really *do* involved > unprivileged or less privileged eBPF, though. Let's see: > > systemd --user: systemd --user *is not privileged at all*. There's no > issue of reducing privilege, since systemd --user doesn't have any > privilege to begin with. But systemd supports some eBPF features, and > presumably it would like to support them in the systemd --user case. > This is unprivileged eBPF. Let's disambiguate the terminology. This /dev/bpf patch set started as describing the feature as 'unprivileged bpf'. I think that was a mistake. Let's call systemd-like deamon usage of bpf 'less privileged bpf'. This is not unprivileged. 'unprivileged bpf' is what sysctl kernel.unprivileged_bpf_disabled controls. There is a huge difference between the two. I'm against extending 'unprivileged bpf' even a bit more than what it is today for many reasons mentioned earlier. The /dev/bpf is about 'less privileged'. Less privileged than root. We need to split part of full root capability into bpf capability. So that most of the root can be dropped. This is very similar to what cap_net_admin does. cap_net_amdin can bring down eth0 which is just as bad as crashing the box. cap_net_admin is very much privileged. Just 'less privileged' than root. Same thing for cap_bpf. May be we should do both cap_bpf and /dev/bpf to make it clear that this is the same thing. Two interfaces to achieve the same result. > Seccomp. Seccomp already uses cBPF, which is a form of BPF although > it doesn't involve the bpf() syscall. There are some seccomp > proposals in the works that will want some stuff from eBPF. In I'm afraid these proposals won't go anywhere. > So it's a bit of a chicken-and-egg situation. There aren't major > unprivileged eBPF users because the kernel support isn't there. As I said before there are zero known use cases of 'unprivileged bpf'. If I understand you correctly you're refusing to accept that 'less privileged bpf' is a valid use case while pushing for extending scope of 'unprivileged'. Extending the scope is an orthogonal discussion. Currently I'm opposed to that. Whereas 'less privileged' is what people require. > It will remain extremely awkward for containers and > especially nested containers to use eBPF. I'm afraid we have to agree to disagree here and move on.
next prev parent reply index Thread overview: 50+ messages / expand[flat|nested] mbox.gz Atom feed top [not found] <firstname.lastname@example.org> [not found] ` <email@example.com> [not found] ` <firstname.lastname@example.org> [not found] ` <3C595328-3ABE-4421-9772-8D41094A4F57@fb.com> [not found] ` <CALCETrWBnH4Q43POU8cQ7YMjb9LioK28FDEQf7aHZbdf1eBZWg@mail.gmail.com> [not found] ` <0DE7F23E-9CD2-4F03-82B5-835506B59056@fb.com> [not found] ` <CALCETrWBWbNFJvsTCeUchu3BZJ3SH3dvtXLUB2EhnPrzFfsLNA@mail.gmail.com> [not found] ` <201907021115.DCD56BBABB@keescook> [not found] ` <CALCETrXTta26CTtEDnzvtd03-WOGdXcnsAogP8JjLkcj4-mHvg@mail.gmail.com> [not found] ` <4A7A225A-6C23-4C0F-9A95-7C6C56B281ED@fb.com> [not found] ` <CALCETrX2bMnwC6_t4b_G-hzJSfMPrkK4YKs5ebcecv2LJ0rt3w@mail.gmail.com> [not found] ` <514D5453-0AEE-420F-AEB6-3F4F58C62E7E@fb.com> [not found] ` <1DE886F3-3982-45DE-B545-67AD6A4871AB@amacapital.net> [not found] ` <7F51F8B8-CF4C-4D82-AAE1-F0F28951DB7F@fb.com> [not found] ` <77354A95-4107-41A7-8936-D144F01C3CA4@fb.com> [not found] ` <369476A8-4CE1-43DA-9239-06437C0384C7@fb.com> 2019-07-30 20:24 ` Andy Lutomirski 2019-07-31 8:10 ` Song Liu 2019-07-31 19:09 ` Andy Lutomirski 2019-08-02 7:21 ` Song Liu 2019-08-04 22:16 ` Andy Lutomirski 2019-08-05 0:08 ` Andy Lutomirski 2019-08-05 5:47 ` Andy Lutomirski 2019-08-05 7:36 ` Song Liu 2019-08-05 17:23 ` Andy Lutomirski 2019-08-05 19:21 ` Alexei Starovoitov 2019-08-05 21:25 ` Andy Lutomirski 2019-08-05 22:21 ` Andy Lutomirski 2019-08-06 1:11 ` Alexei Starovoitov 2019-08-07 5:24 ` Andy Lutomirski 2019-08-07 9:03 ` Lorenz Bauer 2019-08-07 13:52 ` Andy Lutomirski 2019-08-13 21:58 ` Alexei Starovoitov 2019-08-13 22:26 ` Daniel Colascione 2019-08-13 23:24 ` Andy Lutomirski 2019-08-13 23:06 ` Andy Lutomirski 2019-08-14 0:57 ` Alexei Starovoitov 2019-08-14 17:51 ` Andy Lutomirski 2019-08-14 22:05 ` Alexei Starovoitov [this message] 2019-08-14 22:30 ` Andy Lutomirski 2019-08-14 23:33 ` Alexei Starovoitov 2019-08-14 23:59 ` Andy Lutomirski 2019-08-15 0:36 ` Alexei Starovoitov 2019-08-15 11:24 ` Jordan Glover 2019-08-15 17:28 ` Alexei Starovoitov 2019-08-15 18:36 ` Andy Lutomirski 2019-08-15 23:08 ` Alexei Starovoitov 2019-08-16 9:34 ` Jordan Glover 2019-08-16 9:59 ` Thomas Gleixner 2019-08-16 11:33 ` Jordan Glover 2019-08-16 19:52 ` Alexei Starovoitov 2019-08-16 20:28 ` Thomas Gleixner 2019-08-17 15:02 ` Alexei Starovoitov 2019-08-17 15:44 ` Andy Lutomirski 2019-08-19 9:15 ` Thomas Gleixner 2019-08-15 18:43 ` Jordan Glover 2019-08-15 19:46 ` Kees Cook 2019-08-15 23:46 ` Alexei Starovoitov 2019-08-16 0:54 ` Andy Lutomirski 2019-08-16 5:56 ` Song Liu 2019-08-16 21:45 ` Alexei Starovoitov 2019-08-16 22:22 ` Christian Brauner 2019-08-17 15:08 ` Alexei Starovoitov 2019-08-17 15:16 ` Christian Brauner 2019-08-17 15:36 ` Alexei Starovoitov 2019-08-17 15:42 ` Christian Brauner
Reply instructions: You may reply publically to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --email@example.com \ --firstname.lastname@example.org \ --cc=Kernelemail@example.com \ --firstname.lastname@example.org \ --email@example.com \ --firstname.lastname@example.org \ --email@example.com \ --firstname.lastname@example.org \ --email@example.com \ --firstname.lastname@example.org \ --email@example.com \ --firstname.lastname@example.org \ --email@example.com \ --firstname.lastname@example.org \ --email@example.com \ --firstname.lastname@example.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
Linux-Security-Module Archive on lore.kernel.org Archives are clonable: git clone --mirror https://lore.kernel.org/linux-security-module/0 linux-security-module/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 linux-security-module linux-security-module/ https://lore.kernel.org/linux-security-module \ email@example.com firstname.lastname@example.org public-inbox-index linux-security-module Newsgroup available over NNTP: nntp://nntp.lore.kernel.org/org.kernel.vger.linux-security-module AGPL code for this site: git clone https://public-inbox.org/ public-inbox