[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160203195303.GA991@pc.thejh.net>
Date: Wed, 3 Feb 2016 20:53:03 +0100
From: Jann Horn <jann@...jh.net>
To: Nikhilesh Reddy <reddyn@...eaurora.org>
Cc: torvalds@...ux-foundation.org, Miklos Szeredi <miklos@...redi.hu>,
fuse-devel <fuse-devel@...ts.sourceforge.net>,
linux-kernel@...r.kernel.org, linux-api@...r.kernel.org,
gregkh@...uxfoundation.org, linux-fsdevel@...r.kernel.org,
viro@...iv.linux.org.uk, Richard Weinberger <richard@....at>,
Theodore Ts'o <tytso@....edu>, jack@...e.cz,
Antonio SJ Musumeci <trapexit@...wn.link>, sven.utcke@....de,
Nikolaus Rath <nikolaus@...h.org>,
Jann Horn <jannhorn@...glemail.com>,
Mike Shal <marfey@...il.com>
Subject: Re: [PATCH v5] fuse: Add support for passthrough read/write
On Wed, Feb 03, 2016 at 11:05:57AM -0800, Nikhilesh Reddy wrote:
> Hi
> Thanks for your review again :)
> >
> >Uh... how do you know at this point that the file is actually writable?
> >Normally, e.g. vfs_write() will ensure that the file is writable, and
> >e.g. generic_file_write_iter() won't check for writability as far as I
> >can tell. This might allow someone to use the passthrough mechanism to
> >overwrite a file he is only allowed to read, but not write, like
> >/etc/passwd.
>
> I considered adding the checks ( the same ones that VFS does) but not sure
> if we need to.
> So the user will need to construct a fuse filesystem ( that opens for
> O_READONLY even though the user asks for a O_RDWR from the FUSE open) and
> then mount it , with CAP_SYS_ADMIN for which you need to be root but once
> he has that he should be able to easily get to the files without needing to
> go through FUSE right using CAP_DAC_OVERRIDE?
>
> Am i missing something? Please do help me understand.
>
> But yes if really needed I can add additional checks once i understand it
On most Linux desktop systems, and on many servers, the userland "fuse"
package is installed, which ships with a setuid root helper "fusermount":
$ ls -l /bin/fusermount
-rwsr-xr-x 1 root root 30800 May 21 2015 /bin/fusermount
This setuid helper allows any user to mount FUSE filesystems anywhere he
wants. This works as follows: main() calls mount_fuse(), which opens
/dev/fuse by calling open_fuse_device(). mount_fuse() then makes sure
that the caller has write access to the directory he is about to mount
over using check_perm(), then calls mount() via do_mount(). mount_fuse()
returns the /dev/fuse fd, which is then sent to the invoker of fusermount
through a unix domain socket.
(What the setuid binary does control are the mount options; those are
used to enforce that the user can't mount filesystems that are
accessible for other users.)
Note that at no point, any data is sent to or read from the FUSE control
fd by fusermount. Therefore, the init reply that is processed in
process_init_reply() and determines whether passthrough will be enabled
is controlled by the unprivileged caller.
This fusermount mechanism is used by pseudo-filesystems like sshfs in
order to allow unprivileged users to use them.
fusermount aside, there is also an (as far as I know) pending patch with
the intent to make FUSE usable in user namespaces, which is going to
allow unprivileged users to mount FUSE filesystems even without a
userspace helper: https://lkml.org/lkml/2015/12/2/472
(Note that this is very different from CUSE, which by design must never
be exposed to non-root code.)
> >Also, I think this might bypass mandatory locks, the
> >security_file_permission hook (which seems like a bad idea anyway
> >though), inotify/fsnotify and sb_start_write.
> >
> Can you please elaborate/clarify further? I am am not sure what you mean.
Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)
Powered by blists - more mailing lists