[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190828233828.p7xddyw3fjzfinm6@ast-mbp.dhcp.thefacebook.com>
Date: Wed, 28 Aug 2019 16:38:30 -0700
From: Alexei Starovoitov <alexei.starovoitov@...il.com>
To: Andy Lutomirski <luto@...nel.org>
Cc: Alexei Starovoitov <ast@...nel.org>,
Kees Cook <keescook@...omium.org>,
LSM List <linux-security-module@...r.kernel.org>,
James Morris <jmorris@...ei.org>, Jann Horn <jannh@...gle.com>,
Peter Zijlstra <peterz@...radead.org>,
Masami Hiramatsu <mhiramat@...nel.org>,
Steven Rostedt <rostedt@...dmis.org>,
"David S. Miller" <davem@...emloft.net>,
Daniel Borkmann <daniel@...earbox.net>,
Network Development <netdev@...r.kernel.org>,
bpf <bpf@...r.kernel.org>, kernel-team <kernel-team@...com>,
Linux API <linux-api@...r.kernel.org>
Subject: Re: [PATCH bpf-next] bpf, capabilities: introduce CAP_BPF
On Tue, Aug 27, 2019 at 11:20:19PM -0700, Andy Lutomirski wrote:
> On Tue, Aug 27, 2019 at 9:49 PM Alexei Starovoitov
> <alexei.starovoitov@...il.com> wrote:
> >
> > On Tue, Aug 27, 2019 at 07:00:40PM -0700, Andy Lutomirski wrote:
> > >
> > > Let me put this a bit differently. Part of the point is that
> > > CAP_TRACING should allow a user or program to trace without being able
> > > to corrupt the system. CAP_BPF as you’ve proposed it *can* likely
> > > crash the system.
> >
> > Really? I'm still waiting for your example where bpf+kprobe crashes the system...
> >
>
> That's not what I meant. bpf+kprobe causing a crash is a bug. I'm
> referring to a totally different issue. On my laptop:
>
> $ sudo bpftool map
> 48: hash name foobar flags 0x0
> key 8B value 8B max_entries 64 memlock 8192B
> 181: lpm_trie flags 0x1
> key 8B value 8B max_entries 1 memlock 4096B
> 182: lpm_trie flags 0x1
> key 20B value 8B max_entries 1 memlock 4096B
> 183: lpm_trie flags 0x1
> key 8B value 8B max_entries 1 memlock 4096B
> 184: lpm_trie flags 0x1
> key 20B value 8B max_entries 1 memlock 4096B
> 185: lpm_trie flags 0x1
> key 8B value 8B max_entries 1 memlock 4096B
> 186: lpm_trie flags 0x1
> key 20B value 8B max_entries 1 memlock 4096B
> 187: lpm_trie flags 0x1
> key 8B value 8B max_entries 1 memlock 4096B
> 188: lpm_trie flags 0x1
> key 20B value 8B max_entries 1 memlock 4096B
>
> $ sudo bpftool map dump id 186
> key:
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00
> value:
> 02 00 00 00 00 00 00 00
> Found 1 element
>
> $ sudo bpftool map delete id 186 key hex 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00
> [this worked]
>
> I don't know what my laptop was doing with map id 186 in particular,
> but, whatever it was, I definitely broke it. If a BPF firewall is in
> use on something important enough, this could easily remove
> connectivity from part or all of the system. Right now, this needs
> CAP_SYS_ADMIN. With your patch, CAP_BPF is sufficient to do this, but
> you *also* need CAP_BPF to trace the system using BPF. Tracing with
> BPF is 'safe' in the absence of bugs. Modifying other peoples' maps
> is not.
That lpm_trie is likely systemd implementing IP sandboxing.
Not sure whether it's white or black list.
Deleting an IP address from that map will either allow or disallow
network traffic.
Out of band operation on bpf map broke some bpf program. Sure.
But calling it 'breaking the system' is quite a stretch.
Calling it 'crashing the system' is plain wrong.
Yet you're generalizing this bpf map read/write as
"CAP_BPF as you’ve proposed it *can* likely crash the system."
This is what I have a problem with.
Anyway, changing gears...
Yes. I did propose to make a task with CAP_BPF to be able to
manipulate arbitrary maps in the system.
You could have said that if CAP_BPF is given to 'bpftool'
then any user will be able to mess with other maps because
bpftool is likely chmod-ed 755.
Absolutely correct!
It's not a fault of the CAP_BPF scope.
Just don't give that cap to bpftool or do different acl/chmod.
> If the answer is the latter, then maybe it would make sense to try to
> implement some of the unprivileged bpf stuff and then to see whether
> CAP_BPF is still needed.
<broken_record_mode=on> Nack to extensions to unprivileged bpf.
Powered by blists - more mailing lists