[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87h7r0qbqi.fsf@x220.int.ebiederm.org>
Date: Mon, 12 Oct 2020 00:01:09 -0500
From: ebiederm@...ssion.com (Eric W. Biederman)
To: Andy Lutomirski <luto@...nel.org>
Cc: Josh Triplett <josh@...htriplett.org>,
"Serge E. Hallyn" <serge@...lyn.com>,
Christian Brauner <christian.brauner@...ntu.com>,
Linux Containers <containers@...ts.linux-foundation.org>,
Alexander Mihalicyn <alexander@...alicyn.com>,
Mrunal Patel <mpatel@...hat.com>, Wat Lim <watl@...gle.com>,
Aleksa Sarai <cyphar@...har.com>,
Pavel Tikhomirov <ptikhomirov@...tuozzo.com>,
Geoffrey Thomas <geofft@...reload.com>,
Joseph Christopher Sible <jcsible@...t.org>,
Mickaël Salaün <mic@...ikod.net>,
Vivek Goyal <vgoyal@...hat.com>,
Giuseppe Scrivano <gscrivan@...hat.com>,
Stephane Graber <stgraber@...ntu.com>,
Kees Cook <keescook@...omium.org>,
Sargun Dhillon <sargun@...gun.me>,
LKML <linux-kernel@...r.kernel.org>
Subject: Re: LPC 2020 Hackroom Session: summary and next steps for isolated user namespaces
Andy Lutomirski <luto@...nel.org> writes:
> On Sun, Oct 11, 2020 at 1:53 PM Josh Triplett <josh@...htriplett.org> wrote:
>>
>> On Fri, Oct 09, 2020 at 11:26:06PM -0500, Serge E. Hallyn wrote:
>> > > 3. Find a way to allow setgroups() in a user namespace while keeping
>> > > in mind the case of groups used for negative access control.
>> > > This was suggested by Josh Triplett and Geoffrey Thomas. Their idea was to
>> > > investigate adding a prctl() to allow setgroups() to be called in a user
>> > > namespace at the cost of restricting paths to the most restrictive
>> > > permission. So if something is 0707 it needs to be treated as if it's 0000
>> > > even though the caller is not in its owning group which is used for negative
>> > > access control (how these new semantics will interact with ACLs will also
>> > > need to be looked into).
>> >
>> > I should probably think this through more, but for this problem, would it
>> > not suffice to add a new prevgroups grouplist to the struct cred, maybe
>> > struct group_info *locked_groups, and every time an unprivileged task creates
>> > a new user namespace, add all its current groups to this list?
>>
>> So, effectively, you would be allowed to drop permissions, but
>> locked_groups would still be checked for restrictions?
>>
>> That seems like it'd introduce a new level of complexity (a new facet of
>> permission) to manage. Not opposed, but it does seem more complex than
>> just opting out of using groups for negative permissions.
>
> Is there any context other than regular UNIX DAC in which groups can
> act as negative permissions or is this literally just an issue for
> files with a more restrictive group mode than other mode?
Just that.
The ideas kicked around in the conversation were some variant of having
a sysctl that says "This system never uses groups for negative
permissions".
It was also suggested that if the sysctl was set the the permission
checks would be altered such that even if someone tried to set a
negative permission, the more liberal permissions of other would be used
instead.
Given that creating /etc/subgid is effectively opting out of negative
permissions already have a sysctl that says that upfront feels like a
very clean solution.
Eric
Powered by blists - more mailing lists