[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87h70h5d36.fsf@email.froward.int.ebiederm.org>
Date: Thu, 06 Oct 2022 07:52:13 -0500
From: "Eric W. Biederman" <ebiederm@...ssion.com>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Paul Moore <paul@...l-moore.com>,
linux-security-module@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [GIT PULL] LSM patches for v6.1
Linus Torvalds <torvalds@...ux-foundation.org> writes:
> On Wed, Oct 5, 2022 at 5:39 AM Eric W. Biederman <ebiederm@...ssion.com> wrote:
>>
>> We already have /proc/sys/user/max_user_namespaces. It is a per userns
>> control so you can run it in as fine grain as you like. A little
>> cumbersome perhaps but real.
>
> It's not that it's cumbersome.
>
> It's that it is *USELESS*.
Not quite. Because you can have lower settings inside created user
namespaces, it is easy to create a user namespace so inside of
a sandbox you can't create more user namespaces.
> Sure, it limits the memory footprint of somebody who does the
> fork-bomb equivalent of user namespaces, but that's the least of the
> problems.
>
> Just think of normal users. They'd want a limited number of user
> namespaces for things like sandboxing (whether google chrome or
> whatever).
>
> So distros do want to allow people a few of them.
>
> But they want to be able to do so in a *controlled* manner. Not a "ok,
> this user can create five user namespaces and do whatever they want in
> them". Because we've had the issues where some kernel part has gotten
> things wrong, and thought "local NS root means root" or similar.
>
> So it's not about the number of namespaces. AT ALL. It's about *who*
> and *what* does them.
I see your concern that I am not acknowledging the current state of play
of user namespaces, and what problems they may be causing people. Let
me describe what I understand the current state to be and you can
correct me where I am wrong.
At this point every old-school distro I am aware of enables user
namespaces by default. (I don't know what android and chrome-os do). As
best I have been able to determine the bugs that are turning up are the
same kinds of bugs and at roughly the same rates as bugs turn up
anywhere else in the user/kernel interface.
There is a common trend that shows up when people examine posted
exploits (especially exploits connected to CVEs), a lot of the exploits
create user namespaces. As best as I have been able to determine this
has two causes. Arranging the conditions so that the bugs can be
triggered without using user namespaces is more difficult. There is
more attack surface when user namespaces are enabled.
Even so it is my sense that for a typical linux desktop the additional
risk of running with user namespaces enabled is negligible. My sense is
that there is a modest probability that there is a exploitable kernel
bug with user namespaces disabled, and that enabling them only slightly
increases the probability that there is an exploitable kernel bug.
The conclusion I draw from that is that it is ok to leave the use of
namespaces enabled by default for most people most of the time.
As best as I can determine it takes running on separate machines, or
possibly running inside of virtual machines to provide reasonable safety
from an attacker who manages to run arbitrary unprivileged userspace
code. I don't believe disabling user namespaces appreciably moves the
needle.
In the linux desktop space there is chrome, and things like flatpak
that use sandboxes to run applications. Making the gain of being able
to construct your own sandboxes something that has practical utility.
I believe that sandboxes make it more difficult for attackers to
achieve the ability to run arbitrary unprivileged userspace code.
So I think user namespaces are better default on. Having user
namespaces default on means that people find them available and use
them. Asking people to code for enviroments where user namespaces
may be on, may be off to the best I believe will encourage people
not to use the best tools that are available for securing their
applications, and so will be a net detriment to the community.
That is why max_user_namespaces looks like all it is good for is
preventing the user namespace equivalent of fork bombs, but is in fact
trivially capable of disabling user namespaces in sandboxes.
I do think there are cases where things get locked down and sandboxed
and tight that people should disable anything and everything they don't
need. That in those case you want to implement the principle of least
privilege. I see no problem with supporting those kinds of systems.
>> I don't know. I tried to have the conversation and Paul shut it down.
>
> I really get the feeling that the problem here is that you're not even
> acknowledging the whole issue to begin with, since you mention that
> "max_user_namespaces" not once, but twice in the email.
Mentioning max_user_namespaces was my point that I very much see the
need for some controls. That there are some already existing and
that is the one I built in the kernel already. Not a contention
that these are good enough.
Saying Paul was the one who shut things down was probably going a bit
too far. But I am very frustrated that the my attempts to figure out
what was going on.
>> It would be the easiest thing in the world in security_capable to
>> ask is this a trusted app, if not the answer is no.
>
> Isn't this *literally* what security_create_user_ns() would basically
> be doing?
The actual implementation of security_create_user_ns() current creates
regressions in userspace.
So I think the current implementation needs to be reverted, and the
current failure paths in create_user_ns with the same behavior need to
be fixed and we can talk about what are appropriate mechanisms to add
to the kernel.
I trust you can handle the revert of the regression. At the moment I
have spent way more time on this then I have time for. My family needs
me.
Eric
Powered by blists - more mailing lists