[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210318203912.GA26982@ircssh-2.c.rugged-nimbus-611.internal>
Date: Thu, 18 Mar 2021 20:39:13 +0000
From: Sargun Dhillon <sargun@...gun.me>
To: Christian Brauner <christian.brauner@...ntu.com>
Cc: Kees Cook <keescook@...omium.org>,
LKML <linux-kernel@...r.kernel.org>,
Giuseppe Scrivano <gscrivan@...hat.com>,
Tycho Andersen <tycho@...ho.pizza>,
Hariharan Ananthakrishnan <hari@...flix.com>,
Keerti Lakshminarayan <keerti@...flix.com>,
Kyle Anderson <kylea@...flix.com>,
Linux Containers List <containers@...ts.linux-foundation.org>,
stgraber@...ntu.com, Andy Lutomirski <luto@...capital.net>
Subject: Re: seccomp: Delay filter activation
On Thu, Mar 18, 2021 at 03:54:54PM +0100, Christian Brauner wrote:
> Sorry, I just found that mail.
>
> On Mon, Mar 01, 2021 at 03:44:06PM -0800, Kees Cook wrote:
> > On Mon, Mar 01, 2021 at 02:21:56PM +0100, Christian Brauner wrote:
> > > On Mon, Mar 01, 2021 at 12:09:09PM +0100, Christian Brauner wrote:
> > > > On Sat, Feb 20, 2021 at 01:31:57AM -0800, Sargun Dhillon wrote:
> > > > > We've run into a problem where attaching a filter can be quite messy
> > > > > business because the filter itself intercepts sendmsg, and other
> > > > > syscalls related to exfiltrating the listener FD. I believe that this
> > > > > problem set has been brought up before, and although there are
> > > > > "simpler" methods of exfiltrating the listener, like clone3 or
> > > > > pidfd_getfd, but these are still less than ideal.
> >
> > I'm trying to make sure I understand: the target process would like to
> > have a filter attached that blocks sendmsg, but that would mean it has
> > no way to send the listener FD to its manager?
>
> With pidfd_getfd() that wouldn't be a problem, I think which is what I
> was trying to say. Unless the supervising task doen't have enough
> privilege over the supervised task which seems like an odd scenario but
> is technically possible, I guess.
>
> >
> > And you'd want to have listening working for sendmsg (otherwise you
> > could do it with two filters, I imagine)?
> >
> > > > int fd_filter = seccomp(SECCOMP_SET_MODE_FILTER, SECCOMP_FILTER_DETACHED, &prog);
> > > >
> > > > BARRIER_WAIT_SETUP_DONE;
> > > >
> > > > int ret = seccomp(SECCOMP_ATTACH_FILTER, 0, INT_TO_PTR(fd_listener));
> > >
> > > This obviously should've been sm like:
> > >
> > > struct seccomp_filter_attach {
> > > union {
> > > __s32 pidfd;
> > > __s32 pid;
> > > };
> > > __u32 fd_filter;
> > > };
> > >
> > > and then
> > >
> > > int ret = seccomp(SECCOMP_ATTACH_FILTER, 0, seccomp_filter_attach);
> >
> > Given the difficulty with TSYNC, I'm not excited about adding an
> > "apply this filter to another process" API. :)
>
> Just to give a more complete reason for suggesting something like this
> without trying to argue that we must have this:
>
> seccomp() has so far been an API that is caller-centric and by that I
> mean that the caller loaded it's seccomp profile and sandboxed itself. As
> such seccomp is an example of "caller-managed" security. This security
> model has obvious advantages and fits into the general fork()-like world
> of unix. But imho that self-management model breaks down as soon as a
> file descriptor that can be used to refer to the object in question
> enters into the picture. For seccomp this "breaking point" was the
> seccomp notifier fd.
>
> Because with the introduction of that fd we have introduced the concept
> of supervisor and supervisee for seccomp which imho didn't really exist
> in the same way before. It's pretty obvious from the type of language
> that we now use both in userspace and in kernelspace when we talk about
> the seccomp notifier.
>
> At the current point we're somewhere in the middle between caller-managed
> and supervised seccomp which brings up funny probelms and edge-cases.
> One of them most obvious examples is in fact the question how to get the
> seccomp notify fd out of the supervised task. This clearly points to the
> fact that we're missing one of the fundamentals of an fd-based
> supervision model: open(). This is why I was suggesting the
> SECCOMP_ATTACH_FILTER command. It's in a sense an open-call for the
> seccomp notify fd.
>
> That all being said I know that it can be weird to implement this and if
> you prefer we go with another simpler model to work around such things
> than I fully understand.
>
> Christian
So, beyond clone3 to get pidfds being kind of awkward, how do you see this
pattern actually working? How does the filter installer let the supervisor
know that it's ready for extraction? pause() + signaling the parent?
In the case that you're not fork-execing, how do you communicate to the
notifier? My coworkers have been working on this code, where they need to
connect to a daemon that does the supervision, and it's gnarly[1]. They're
looking at adding sendmsg to the filter list, and that complicates things.
I think that pidfd_getfd works well if the child has some way to signal to the
parent that it's ready and that the filter has been installed, but when your
filter intercepts connect, and sendmsg, and the supervisor is not your parent
(and your parent is some compiled, COTS software), it becomes complicated to
handle this.
I believe that the OCI spec[2] is going to run into this class of problem unless
we introduce an out of band signaling mechanism. I think a valid way to handle
this is do a send() of the fd number (literal), and wait for the other side to
pidfd_getfd the seccomp filter, and wait for the socket to be closed to continue,
but I think we should maybe create an example (I volunteer) showing how to do this.
[1]:
https://github.com/Netflix/titus-executor/blob/393d71fa3b4ab836c6036c6a242a7f4fd2d0307e/tini/src/seccomp_fd_notify.c#L139-L201
[2]:
https://github.com/opencontainers/runtime-spec/commit/a8c4a9ee0f6b5a0b994c5c23c68725394e2b0d9d
Powered by blists - more mailing lists