Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752692AbaLJAVt (ORCPT ); Tue, 9 Dec 2014 19:21:49 -0500 Received: from mail-la0-f44.google.com ([209.85.215.44]:32774 "EHLO mail-la0-f44.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752394AbaLJAVp convert rfc822-to-8bit (ORCPT ); Tue, 9 Dec 2014 19:21:45 -0500 MIME-Version: 1.0 In-Reply-To: <971ad3f6-90fd-4e3f-916c-8988af3c826d@email.android.com> References: <52e0643bd47b1e5c65921d6e00aea1f724bb510a.1417281801.git.luto@amacapital.net> <87fvcxyf28.fsf_-_@x220.int.ebiederm.org> <874mtdyexp.fsf_-_@x220.int.ebiederm.org> <87a935u3nj.fsf@x220.int.ebiederm.org> <87388xodlj.fsf@x220.int.ebiederm.org> <87h9x5re41.fsf_-_@x220.int.ebiederm.org> <87mw6xpzb0.fsf_-_@x220.int.ebiederm.org> <87ppbtn4mv.fsf@x220.int.ebiederm.org> <87a92xn2io.fsf@x220.int.ebiederm.org> <87r3w8liw4.fsf@x220.int.ebiederm.org> <87iohklfvj.fsf_-_@x220.int.ebiederm.org> <87fvcok11h.fsf_-_@x220.int.ebiederm.org> <971ad3f6-90fd-4e3f-916c-8988af3c826d@email.android.com> From: Andy Lutomirski Date: Tue, 9 Dec 2014 16:21:23 -0800 Message-ID: Subject: Re: [CFT][PATCH 7/8] userns: Add a knob to disable setgroups on a per user namespace basis To: "Eric W.Biederman" Cc: Linux Containers , Josh Triplett , Andrew Morton , Kees Cook , Michael Kerrisk-manpages , Linux API , linux-man , "linux-kernel@vger.kernel.org" , LSM , Casey Schaufler , "Serge E. Hallyn" , Richard Weinberger , Kenton Varda , stable Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Dec 9, 2014 at 4:04 PM, Eric W.Biederman wrote: > > > On December 9, 2014 4:28:38 PM CST, Andy Lutomirski wrote: >>On Tue, Dec 9, 2014 at 12:42 PM, Eric W. Biederman >> wrote: >>> >>> - Expose the knob to user space through a proc file >>/proc//setgroups >>> >>> A value of "deny" means the setgroups system call is disabled in >>the >>> current processes user namespace and can not be enabled in the >>> future in this user namespace. >>> >>> A value of "allow" means the segtoups system call is enabled. >>> >>> - Descendant user namespaces inherit the value of setgroups from >>> their parents. >>> >>> - A proc file is used (instead of a sysctl) as sysctls >>> currently do not pass in a struct file so file_ns_capable >>> is unusable. >> >>Reviewed-by: Andy Lutomirski >> >>But I still don't like the name "setgroups". People may look at that >>and have no clue what the scope of the setting is. And anyone who, as >>root, writes "deny" to /proc/self/setgroups, thinking that it acts on >>self, will be in for a surprise. > > True setgroups isn't perfect. Documenting it in a manpage may have to be enough. The only real improvement I can think of would be to make the setting a sysctl. But I think pursuing that approaches the point where perfection is the enemy of getting this problem fixed. > Would "userns_setgroups" be okay? --Andy > Eric -- Andy Lutomirski AMA Capital Management, LLC -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/