[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5411B5D6.9010201@gmail.com>
Date: Thu, 11 Sep 2014 07:46:46 -0700
From: "Michael Kerrisk (man-pages)" <mtk.manpages@...il.com>
To: "Eric W. Biederman" <ebiederm@...ssion.com>
CC: mtk.manpages@...il.com, Andy Lutomirski <luto@...capital.net>,
lkml <linux-kernel@...r.kernel.org>,
"linux-man@...r.kernel.org" <linux-man@...r.kernel.org>,
Linux Containers <containers@...ts.linux-foundation.org>,
richard -rw- weinberger <richard.weinberger@...il.com>,
"Serge E. Hallyn" <serge@...lyn.com>
Subject: Re: For review: user_namespace(7) man page
Hi Eric,
On 09/09/2014 09:05 AM, Eric W. Biederman wrote:
> "Michael Kerrisk (man-pages)" <mtk.manpages@...il.com> writes:
>
>> Hi Andy, and Eric,
>>
>> On 09/01/2014 01:57 PM, Andy Lutomirski wrote:
>>> On Wed, Aug 20, 2014 at 4:36 PM, Michael Kerrisk (man-pages)
>>> <mtk.manpages@...il.com> wrote:
>>>> Hello Eric et al.,
>>>>
>>>> For various reasons, my work on the namespaces man pages
>>>> fell off the table a while back. Nevertheless, the pages have
>>>> been close to completion for a while now, and I recently restarted,
>>>> in an effort to finish them. As you also noted to me f2f, there have
>>>> been recently been some small namespace changes that you may affect
>>>> the content of the pages. Therefore, I'll take the opportunity to
>>>> send the namespace-related pages out for further (final?) review.
>>>>
>>>> So, here, I start with the user_namespaces(7) page, which is shown
>>>> in rendered form below, with source attached to this mail. I'll
>>>> send various other pages in follow-on mails.
>>>>
>>>> Review comments/suggestions for improvements / bug fixes welcome.
>>>>
>>>> Cheers,
>>>>
>>>> Michael
>>>>
>>>> ==
>>>>
>>>> NAME
>>>> user_namespaces - overview of Linux user_namespaces
>>>>
>>>> DESCRIPTION
>>>> For an overview of namespaces, see namespaces(7).
>>>>
>>>> User namespaces isolate security-related identifiers and
>>>> attributes, in particular, user IDs and group IDs (see creden‐
>>>> tials(7), the root directory, keys (see keyctl(2)), and capabili‐
>>>
>>> Putting "root directory" here is odd -- that's really part of a
>>> different namespace. But user namespaces sort of isolate the other
>>> namespaces from each other.
>>
>> I'm trying to remember the details here. I think this piece originally
>> came after a discussion with Eric, but I am not sure. Eric?
>
> Probably.
>
> I am not certain what the best way to say it but we do need to document
> that an unprivileged user that creates a user namespace can now call
> chroot.
>
> We may also want to discuss the specific restrictions on chroot.
>
> The text about chroot at least gives people a strong hint that the
> chroot rules are affected by user namespaces.
>
> The restrictions that we have settled on to avoid chroot being a problem
> are the creator of a user namespace must not be chrooted in their
> current mount namespace, and the creator of the user namespace must not
> be threaded.
>
> Andy can you check me on this it looks like unshare is currently buggy
> in that it will allow a threaded application to create a user namespace.
So, somewhere we should have some text such as:
[[
An unprivileged user who creates a namespace can call chroot(2)
within that namesapce, subject to the restriction that the
creator of a user namespace must not be chrooted in their
current mount namespace, and the creator of the user namespace must not
be threaded.
]]
Right?
>>> Also, ugh, keys. How did keyctl(2) ever make it through any kind of review?
>>>
>>>> ties (see capabilities(7)). A process's user and group IDs can
>>>> be different inside and outside a user namespace. In particular,
>>>> a process can have a normal unprivileged user ID outside a user
>>>> namespace while at the same time having a user ID of 0 inside the
>>>> namespace; in other words, the process has full privileges for
>>>> operations inside the user namespace, but is unprivileged for
>>>> operations outside the namespace.
>>>>
>>>> Nested namespaces, namespace membership
>>>> User namespaces can be nested; that is, each user namespace—
>>>> except the initial ("root") namespace—has a parent user names‐
>>>> pace, and can have zero or more child user namespaces. The par‐
>>>> ent user namespace is the user namespace of the process that cre‐
>>>> ates the user namespace via a call to unshare(2) or clone(2) with
>>>> the CLONE_NEWUSER flag.
>>>>
>>>> The kernel imposes (since version 3.11) a limit of 32 nested lev‐
>>>> els of user namespaces. Calls to unshare(2) or clone(2) that
>>>> would cause this limit to be exceeded fail with the error EUSERS.
>>>>
>>>> Each process is a member of exactly one user namespace. A
>>>> process created via fork(2) or clone(2) without the CLONE_NEWUSER
>>>> flag is a member of the same user namespace as its parent. A
>>>> process can join another user namespace with setns(2) if it has
>>>> the CAP_SYS_ADMIN in that namespace; upon doing so, it gains a
>>>> full set of capabilities in that namespace.
>>>>
>>>> A call to clone(2) or unshare(2) with the CLONE_NEWUSER flag
>>>> makes the new child process (for clone(2)) or the caller (for
>>>> unshare(2)) a member of the new user namespace created by the
>>>> call.
>>>>
>>>> Capabilities
>>>> The child process created by clone(2) with the CLONE_NEWUSER flag
>>>> starts out with a complete set of capabilities in the new user
>>>> namespace. Likewise, a process that creates a new user namespace
>>>> using unshare(2) or joins an existing user namespace using
>>>> setns(2) gains a full set of capabilities in that namespace. On
>>>> the other hand, that process has no capabilities in the parent
>>>> (in the case of clone(2)) or previous (in the case of unshare(2)
>>>> and setns(2)) user namespace, even if the new namespace is cre‐
>>>> ated or joined by the root user (i.e., a process with user ID 0
>>>> in the root namespace).
>>>>
>>>> Note that a call to execve(2) will cause a process to lose any
>>>> capabilities that it has, unless it has a user ID of 0 within the
>>>> namespace.
>>>
>>> Or unless file capabilities have a non-empty inheritable mask.
>>>
>>> It may be worth mentioning that execve in a user namespace works
>>> exactly like execve outside a userns.
>>
>>
>> I';ve reworded that para to say:
>>
>> Note that a call to execve(2) will cause a process's capabili‐
>> ties to be recalculated in the usual way (see capabilities(7)),
>> so that usually, unless it has a user ID of 0 within the names‐
>> pace or the executable file has a nonempty inheritable capabil‐
>> ities mask, it will lose all capabilities. See the discussion
>> of user and group ID mappings, below.
>>
>> Okay?
>
> That seems reasonable to me.
>
>>>> $ cat /proc/$$/uid_map
>>>> 0 0 4294967295
>>>>
>>>> This mapping tells us that the range starting at user ID 0 in
>>>> this namespace maps to a range starting at 0 in the (nonexistent)
>>>> parent namespace, and the length of the range is the largest
>>>> 32-bit unsigned integer.
>>>>
>>>> Defining user and group ID mappings: writing to uid_map and gid_map
>>>> After the creation of a new user namespace, the uid_map file of
>>>> one of the processes in the namespace may be written to once to
>>>> define the mapping of user IDs in the new user namespace. An
>>>> attempt to write more than once to a uid_map file in a user
>>>> namespace fails with the error EPERM. Similar rules apply for
>>>> gid_map files.
>>>>
>>>> The lines written to uid_map (gid_map) must conform to the fol‐
>>>> lowing rules:
>>>>
>>>> * The three fields must be valid numbers, and the last field
>>>> must be greater than 0.
>>>>
>>>> * Lines are terminated by newline characters.
>>>>
>>>> * There is an (arbitrary) limit on the number of lines in the
>>>> file. As at Linux 3.8, the limit is five lines. In addition,
>>>> the number of bytes written to the file must be less than the
>>>> system page size, and the write must be performed at the start
>>>> of the file (i.e., lseek(2) and pwrite(2) can't be used to
>>>> write to nonzero offsets in the file).
>>>>
>>>> * The range of user IDs (group IDs) specified in each line can‐
>>>> not overlap with the ranges in any other lines. In the ini‐
>>>> tial implementation (Linux 3.8), this requirement was satis‐
>>>> fied by a simplistic implementation that imposed the further
>>>> requirement that the values in both field 1 and field 2 of
>>>> successive lines must be in ascending numerical order, which
>>>> prevented some otherwise valid maps from being created. Linux
>>>> 3.9 and later fix this limitation, allowing any valid set of
>>>> nonoverlapping maps.
>>>>
>>>> * At least one line must be written to the file.
>>>>
>>>> Writes that violate the above rules fail with the error EINVAL.
>>>>
>>>> In order for a process to write to the /proc/[pid]/uid_map
>>>> (/proc/[pid]/gid_map) file, all of the following requirements
>>>> must be met:
>>>>
>>>> 1. The writing process must have the CAP_SETUID (CAP_SETGID)
>>>> capability in the user namespace of the process pid.
>>>
>>> This checked for the opening process (and I don't actually remember
>>> whether it's checked for the writing process).
>>
>> Eric, can you comment?
>
> We have to check for the opening processes and that changes was made
> after I implemented my interface. Pieces of the code appear to also
> examine the writing process and verify everything applies to it as well.
>
> I goofed when I designed the interface originall and had not realized
> what a classic design error it can be to not restrict by the opening
> process.
So, I still need some help here. Should the sentence above just read:
1. The *opening* process must have the CAP_SETUID (CAP_SETGID)
capability in the user namespace of the process pid.
or must something also be said about the writing process? (If so, i'd
appreciate a completely formed sentence or two that I can just drop into
the man page..)
Cheers,
Michael
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists