[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87r0zmigx6.fsf@email.froward.int.ebiederm.org>
Date: Wed, 05 Oct 2022 07:38:45 -0500
From: "Eric W. Biederman" <ebiederm@...ssion.com>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Paul Moore <paul@...l-moore.com>,
linux-security-module@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [GIT PULL] LSM patches for v6.1
Linus Torvalds <torvalds@...ux-foundation.org> writes:
> On Tue, Oct 4, 2022 at 1:37 PM Eric W. Biederman <ebiederm@...ssion.com> wrote:
>>
>> Please don't pull the user namespace bits of this code.
>
> Eric, already done.
>
> And I think you are in denial about how many problems the
> user-namespace stuff has caused.
>
> Distros are literally turning it off entirely because the whole "let
> users create their own namespace" has *NOT* been a great success.
>
> I personally think it was a mistake. We're stuck with it, but we most
> definitely need knobs to manage it that isn't just "enable/disable
> USER_NS" in the kernel config.
>
> So this whole "don't do this" approach you have is not acceptable.
>
> 99% of all code does NOT WANT the user namespace thing, and it's been
> a big new attack surface for the kernel getting things subtly wrong.
Yes. I know, and I keep saying geez guys isn't this the problem?
And I get told nope. That isn't it.
> I do not understand your "people need to be able to do this with no
> controls", when the alternative is to literally turn it off ENTIRELY.
We already have /proc/sys/user/max_user_namespaces. It is a per userns
control so you can run it in as fine grain as you like. A little
cumbersome perhaps but real.
> I'm not saying that an LSM is the only place to do it, but I don't
> think there have been any better suggestions either.
I don't know. I tried to have the conversation and Paul shut it down.
Effectively he said that where two or more out of tree LSM policies want
something it makes no sense to discussion the actual reasons people want
to use the hook.
> Put another way: your "no limits are acceptable" is simply not
> realistic, and you haven't given any sane alternatives that I am aware
> of. No way to say "sure, let trusted system apps create their
> namespaces, but not random things".
That isn't my position at all, that isn't even the case in the current
code.
In there current code there are two mechanisms that can be used to limit
things to secure system apps. There is
/proc/sys/user/max_user_namespaces, and the security_capable hook in the
LSM.
I can imagine that /proc/sys/user/max_user_namespaces could be a bit
awkward to use as things need to be shuffled around a bit to get
a user namespace in place that you can use to set your number additional
user namespaces to 0, for the untrusted apps.
I can imagine that security_capable being a little unintuitive to find
but it has a parameter telling you it wants a capability from a
non-default user namespace.
It would be the easiest thing in the world in security_capable to
ask is this a trusted app, if not the answer is no.
My big objections are: Paul Moore shutdown the entire discussion into
why this is needed and alternatives, and that the mechanism the hook
is using silently breaks userspace applications.
In particular chrome's sandbox is silently disabled. So in practice I
see this change advocating for silently stripping security from
userspace applications.
There is a security trade-off between attack surface and securing
applications here that I could never get the conversation around too.
My sense is that Paul figures with the policy in userspace (AKA the code
that actually uses these hooks), that it is completely out of scope to
consider what functionality the hooks make available.
In short I completely failed to have any reasonable conversations about
this code or it's implications, and it breaks userspace.
Eric
Powered by blists - more mailing lists