[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20141116050715.GC18880@thin>
Date: Sat, 15 Nov 2014 21:07:15 -0800
From: Josh Triplett <josh@...htriplett.org>
To: "Eric W. Biederman" <ebiederm@...ssion.com>
Cc: Theodore Ts'o <tytso@....edu>,
Andy Lutomirski <luto@...capital.net>,
Andrew Morton <akpm@...ux-foundation.org>,
Kees Cook <keescook@...omium.org>,
Michael Kerrisk-manpages <mtk.manpages@...il.com>,
Linux API <linux-api@...r.kernel.org>,
linux-man <linux-man@...r.kernel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH 2/2] groups: Allow unprivileged processes to use
setgroups to drop groups
On Sat, Nov 15, 2014 at 09:08:07PM -0600, Eric W. Biederman wrote:
> Josh Triplett <josh@...htriplett.org> writes:
> > On November 15, 2014 6:05:11 PM PST, Theodore Ts'o <tytso@....edu> wrote:
> >>On Sat, Nov 15, 2014 at 12:20:42PM -0800, Josh Triplett wrote:
> >>> > However, sudoers seems to allow negative group matches. So maybe
> >>> > allowing this only with no_new_privs already set would make sense.
> >>>
> >>> Sigh, bad sudo. Sure, restricting this to no_new_privs only seems
> >>fine.
> >>> I'll do that in v2, and document that in the manpage.
> >>
> >>I've also seen use cases (generally back in the bad old days of big
> >>timesharing VAX 750's :-) where the system admin might assign someone
> >>to the "games-abusers" group, and then set /usr/games to mode 705
> >>root:games-abusers --- presumably because it's easier to add a few
> >>people to the deny list rather than having to add all of the EECS
> >>department to the games group minus the abusers.
> >>
> >>So arbitrarily anyone to drop groups from their supplemental group
> >>list will result in a change from both existing practice and legacy
> >>Unix systems, and it could potentially lead to a security exposure.
> >
> > As Andy pointed out, you can already do that with a user namespace,
>
> That may be a bug with the user namespace permission check. Perhaps we
> shouldn't allow dropping groups that aren't mapped in the user
> namespace.
Changing that would break containers for users on many common Linux
distributions, which put users in various supplementary groups by
default.
I do actually have another patch planned, to allow users to set up gid
maps for groups they currently have permission for, not just for their
primary group. But even with that change, breaking the ability for
container-root to use setgroups to drop all its supplementary groups
seems very wrong, and seems highly likely to break real-world software
running in containers.
> To add to the discussion there are also sg and newgroup, though I don't
> think they touch supplementary groups.
Both sg and newgrp do prove a different point, though: an unprivileged
user should be able to change their gid to one of their supplementary
groups. That's another patch I planned to submit after this one:
allow setgid/setresgid/etc to a supplementary group ID.
> > for any case not involving a setuid or setgid (or otherwise
> > privilege-gaining) program. And requiring no_new_privs handles that.
>
> Frankly adding a no_new_privs check to allow something/anything scares
> me. That converts no_new_privs from something simple and easy to
> understand to something much more complicated.
no_new_privs already exists in large part to support such use cases,
such as setting seccomp filters, which would be dangerous for
privilege-escalating programs to inherit.
> > Given the combination of those two things, do you still see any
> > problematic cases?
>
> Josh I think it is time to stop and make certain you understand how
> unix groups work in the large.
>
> It seems to me that either supplementary groups can be dropped or
> supplementary groups can not be dropped. If they can be dropped we
> shouldn't need complicated checks to allow them to be dropped in some
> circumstances but not others.
>
> Unix groups are an old interface and they have been used in a lot of
> ways over the years. We need to be careful any change we make is good
> and truly backwards compatible and that we do our darndest not to
> introduce security holes.
Seeking the decades-old precedents and corner cases that might
contradict the most obvious semantics is a large part of what I'm
looking for out of this thread.
However, I don't necessarily think that we must permit unprivileged
setgroups in *all* cases if we permit it in *any*; it may well make
sense to reduce the surface area of the change by limiting the
circumstances in which you can do this. Whether it does end up making
sense to do so depends on the outcome of this discussion.
I added the no_new_privs check at Andy's suggestion, since the use case
I had in mind will work just fine with that restriction. I'm also open
to just allowing setgroups in all cases, if that semantic seems
preferable, or to adding some separate check specific to this case if
that really seems necessary.
- Josh Triplett
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists