[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2319693.5l3M4ZINGd@x2>
Date: Mon, 16 Oct 2017 21:42:52 -0400
From: Steve Grubb <sgrubb@...hat.com>
To: linux-audit@...hat.com
Cc: Richard Guy Briggs <rgb@...hat.com>,
Casey Schaufler <casey@...aufler-ca.com>, mszeredi@...hat.com,
"Eric W. Biederman" <ebiederm@...ssion.com>,
Simo Sorce <simo@...hat.com>, jlayton@...hat.com,
Carlos O'Donell <carlos@...hat.com>,
Linux API <linux-api@...r.kernel.org>,
Linux Containers <containers@...ts.linux-foundation.org>,
Linux Kernel <linux-kernel@...r.kernel.org>,
Eric Paris <eparis@...isplace.org>,
David Howells <dhowells@...hat.com>,
Al Viro <viro@...iv.linux.org.uk>,
Andy Lutomirski <luto@...nel.org>,
Linux Network Development <netdev@...r.kernel.org>,
Linux FS Devel <linux-fsdevel@...r.kernel.org>,
cgroups@...r.kernel.org, "Serge E. Hallyn" <serge@...lyn.com>,
trondmy@...marydata.com
Subject: Re: RFC(v2): Audit Kernel Container IDs
On Monday, October 16, 2017 8:33:40 PM EDT Richard Guy Briggs wrote:
> On 2017-10-12 16:33, Casey Schaufler wrote:
> > On 10/12/2017 7:14 AM, Richard Guy Briggs wrote:
> > > Containers are a userspace concept. The kernel knows nothing of them.
> > >
> > > The Linux audit system needs a way to be able to track the container
> > > provenance of events and actions. Audit needs the kernel's help to do
> > > this.
> > >
> > > Since the concept of a container is entirely a userspace concept, a
> > > registration from the userspace container orchestration system initiates
> > > this. This will define a point in time and a set of resources
> > > associated with a particular container with an audit container ID.
> > >
> > > The registration is a pseudo filesystem (proc, since PID tree already
> > > exists) write of a u8[16] UUID representing the container ID to a file
> > > representing a process that will become the first process in a new
> > > container. This write might place restrictions on mount namespaces
> > > required to define a container, or at least careful checking of
> > > namespaces in the kernel to verify permissions of the orchestrator so it
> > > can't change its own container ID. A bind mount of nsfs may be
> > > necessary in the container orchestrator's mntNS.
> > > Note: Use a 128-bit scalar rather than a string to make compares faster
> > > and simpler.
> > >
> > > Require a new CAP_CONTAINER_ADMIN to be able to carry out the
> > > registration.
> >
> > Hang on. If containers are a user space concept, how can
> > you want CAP_CONTAINER_ANYTHING? If there's not such thing as
> > a container, how can you be asking for a capability to manage
> > them?
>
> There is such a thing, but the kernel doesn't know about it yet. This
> same situation exists for loginuid and sessionid which are userspace
> concepts that the kernel tracks for the convenience of userspace. As
> for its name, I'm not particularly picky, so if you don't like
> CAP_CONTAINER_* then I'm fine with CAP_AUDIT_CONTAINERID. It really
> needs to be distinct from CAP_AUDIT_WRITE and CAP_AUDIT_CONTROL since we
> don't want to give the ability to set a containerID to any process that
> is able to do audit logging (such as vsftpd) and similarly we don't want
> to give the orchestrator the ability to control the setup of the audit
> daemon.
A long time ago, we were debating what should guard against rouge processes
from setting the loginuid. Casey argued that the ability to set the loginuid
means they have the ability to control the audit trail. That means that it
should be guarded by CAP_AUDIT_CONTROL. I think the same logic applies today.
The ability to arbitrarily set a container ID means the process has the
ability to indirectly control the audit trail.
-Steve
Powered by blists - more mailing lists