[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1324224103.21713.26.camel@lenny>
Date: Sun, 18 Dec 2011 11:01:43 -0500
From: Colin Walters <walters@...bum.org>
To: "Eric W. Biederman" <ebiederm@...ssion.com>
Cc: "Serge E. Hallyn" <serge@...lyn.com>,
LKML <linux-kernel@...r.kernel.org>, alan@...rguk.ukuu.org.uk,
morgan@...nel.org, luto@....edu, kzak@...hat.com,
Steve Grubb <sgrubb@...hat.com>
Subject: Re: chroot(2) and bind mounts as non-root
On Thu, 2011-12-15 at 22:14 -0800, Eric W. Biederman wrote:
> Which means it is safe to enter a new user namespace without root
> privileges as once you are in if you execute a suid app it will be suid
> relative to your user namespace. The careful changing of capable to
> ns_capable will allow other namespaces and other things that today are
> root only because of fears of mucking up the execution environment to be
> enabled.
>
> What is slightly up in the air is how do we map user namespaces to
> filesystems. The simplest solution looks to be to setup a uid and gid
> mappings from each child user namespace to the initial system user
> namespace. Then in a child user namespace setuid(2) will fail if
> you attempt to use an id that does not have a mapping.
But setting up a mapping is a privileged operation, right? So then it
seems that practically speaking in an "out of the box" scenario on a
distro like RHEL or Debian, since there's no mapping configured, after a
process enters a new namespace it can't run setuid binaries?
Also I don't see how user namespaces can replace "fakeroot" if this is
true. The whole point of fakeroot is being able to do things like "make
install DESTDIR=/home/user/tmpdir && tar cz -C /home/user/tmpdir -f
foo.tar.gz ." to get a tarball with root-owned files, without actually
requiring the privileges to temporarily make real root owned files. But
without a privileged mapping operation there's no way to map uid 0 in
the namespace to something else on the filesystem, right?
Basically it's not clear to me how you make user namespaces really
flexible without patching the filesystems to support persisting the
namespaces somehow. Unix diehards will probably groan at this, but
honestly the Windows approach where "uids" (SIDs) are strings has its
appeal...that still requires patching filesystems (and in the end lots
of userspace) but it's much more flexible.
I can see how the user namespace work is useful for containers though.
> At the same time this means that
> once you enter a user namespace all of the capabilities you can
> acquire
> are relative to that user namespace.
So it seems like practically speaking if the goal is to be able to
securely run code that "feels like" uid 0 in a container (e.g. start
apache) you have to drop off most of the capabilities that let you take
over the "host". There's a number of these in CAP_SYS_ADMIN.
> Still I find in the kernel it generally is easier to solve the general
> case. It makes everyone happy and it removes the need to ask people to
> rewrite all of their in house applications.
Right, clearly we can't just drop support for setuid binaries from the
kernel, but we *do* have the source code to userspace...it's at least
worth thinking about what could be better if we can assume there aren't
setuid binaries.
I need to think more about the user namespace stuff - but I'm not
getting the impression so far it'll allow me to do what I want without
adding a new setuid binary (or a mount hardlink) to util-linux
basically.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists