From: "Mickaël Salaün" <email@example.com>
To: James Morris <firstname.lastname@example.org>
Cc: email@example.com, "Al Viro" <firstname.lastname@example.org>,
"Andy Lutomirski" <email@example.com>,
"Arnd Bergmann" <firstname.lastname@example.org>,
"Casey Schaufler" <email@example.com>,
"Jann Horn" <firstname.lastname@example.org>,
"Jonathan Corbet" <email@example.com>,
"Kees Cook" <firstname.lastname@example.org>,
"Michael Kerrisk" <email@example.com>,
"Mickaël Salaün" <firstname.lastname@example.org>,
"Serge E . Hallyn" <email@example.com>,
"Shuah Khan" <firstname.lastname@example.org>,
"Vincent Dagonneau" <email@example.com>,
Subject: Re: [PATCH v17 02/10] landlock: Add ruleset and domain management
Date: Thu, 14 May 2020 12:27:45 +0200 [thread overview]
Message-ID: <firstname.lastname@example.org> (raw)
On 14/05/2020 05:09, James Morris wrote:
> On Mon, 11 May 2020, Mickaël Salaün wrote:
>> + * .. warning::
>> + *
>> + * It is currently not possible to restrict some file-related actions
>> + * accessible through these syscall families: :manpage:`chdir(2)`,
>> + * :manpage:`truncate(2)`, :manpage:`stat(2)`, :manpage:`flock(2)`,
>> + * :manpage:`chmod(2)`, :manpage:`chown(2)`, :manpage:`setxattr(2)`,
>> + * :manpage:`ioctl(2)`, :manpage:`fcntl(2)`.
>> + * Future Landlock evolutions will enable to restrict them.
> I have to wonder how useful Landlock will be without more coverage per
> the above.
This is the result of previous discussions (on mailing lists and
conferences) to minimize the code of Landlock to ease review. There is
also network and other subsystems which are not covered, the same way
other LSMs may not cover everything. However, Landlock is designed to be
extensible without breaking user space, so extending this access-control
will not be a problem. Previous versions of this patch series handled
Moreover, we can compare the current situation with seccomp. Indeed,
seccomp only enables to restrict system calls according to their number
and their raw arguments. seccomp is designed to limit the attack surface
of the kernel but it is also used to remove ways to access kernel
resources. Application developers willing to sandbox their products are
already using seccomp but there is limitations (e.g. file access
control). Landlock addresses such limitations, which improves the
We can also view seccomp as a complementary solution to the current
limitations of Landlock. Indeed, seccomp filters can block or restrict
the use of syscall families which may not be currently handled by Landlock.
> It would be helpful if you could outline a threat model for this initial
> version, so people can get an idea of what kind of useful protection may
> be gained from it.
The main threat model may be seen as protecting from vulnerable (i.e.
malicious) code. But because Landlock policies are defined by
application developers, they also define their own threat model.
> Are there any distros or other major users who are planning on enabling or
> at least investigating Landlock?
I think the question should be: is there any distros which are not
interested to improve the security of their users? :)
Landlock is mainly designed for application developers, and most Linux
distros rely on applications which are not developed by themselves.
Some hardened distros such as CLIP OS and Chrome OS are interested to
extend the security of the whole system with tailored sandboxing (e.g.
internal and critical services, security brokers). For example, Chrome
OS folks investigated with a previous version of Landlock:
I'm sure there is other tailored distros which will be interested once
Landlock will be upstream (e.g. Tails, Qubes OS, Subgraph OS, etc.).
> Do you have any examples of a practical application of this scheme?
We can start with applications with builtin sandboxing, like web
browsers, web services, email services, SSH, etc. There is also all
system services handled by an init system which provides security
features (e.g. systemd). There is also the security sandbox tools (e.g.
Minijail , Firejail , nsjail , Flatpak , etc.). And finally,
security-oriented APIs such as Sandboxed API . Most of them should
welcome new Linux sandboxing features provided by Landlock.
next prev parent reply other threads:[~2020-05-14 10:28 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-05-11 19:21 [PATCH v17 00/10] Landlock LSM Mickaël Salaün
2020-05-11 19:21 ` [PATCH v17 01/10] landlock: Add object management Mickaël Salaün
2020-05-11 19:21 ` [PATCH v17 02/10] landlock: Add ruleset and domain management Mickaël Salaün
2020-05-14 3:09 ` James Morris
2020-05-14 10:27 ` Mickaël Salaün [this message]
2020-05-11 19:21 ` [PATCH v17 03/10] landlock: Set up the security framework and manage credentials Mickaël Salaün
2020-05-11 19:21 ` [PATCH v17 04/10] landlock: Add ptrace restrictions Mickaël Salaün
2020-05-11 19:21 ` [PATCH v17 05/10] fs,landlock: Support filesystem access-control Mickaël Salaün
2020-05-14 3:37 ` James Morris
2020-05-14 10:39 ` Mickaël Salaün
2020-05-14 15:58 ` Casey Schaufler
2020-05-14 18:46 ` Mickaël Salaün
2020-05-14 17:31 ` James Morris
2020-05-14 18:49 ` Mickaël Salaün
2020-05-14 19:37 ` James Morris
2020-05-11 19:21 ` [PATCH v17 06/10] landlock: Add syscall implementation Mickaël Salaün
2020-05-11 19:21 ` [PATCH v17 07/10] arch: Wire up landlock() syscall Mickaël Salaün
2020-05-11 19:21 ` [PATCH v17 08/10] selftests/landlock: Add initial tests Mickaël Salaün
2020-05-11 19:21 ` [PATCH v17 09/10] samples/landlock: Add a sandbox manager example Mickaël Salaün
2020-05-11 19:21 ` [PATCH v17 10/10] landlock: Add user and kernel documentation Mickaël Salaün
2020-05-11 21:54 ` [PATCH v17 00/10] Landlock LSM Mickaël Salaün
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).