Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754848AbbKQUzO (ORCPT ); Tue, 17 Nov 2015 15:55:14 -0500 Received: from mail-ig0-f179.google.com ([209.85.213.179]:34175 "EHLO mail-ig0-f179.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752909AbbKQUzK (ORCPT ); Tue, 17 Nov 2015 15:55:10 -0500 Subject: Re: [PATCH v3 0/7] User namespace mount updates To: Seth Forshee References: <1447778351-118699-1-git-send-email-seth.forshee@canonical.com> <20151117170556.GV22011@ZenIV.linux.org.uk> <20151117172551.GA108807@ubuntu-hedt> <20151117175506.GW22011@ZenIV.linux.org.uk> <564B79B1.3040207@gmail.com> <20151117191606.GC108807@ubuntu-hedt> Cc: Al Viro , "Eric W. Biederman" , linux-bcache@vger.kernel.org, dm-devel@redhat.com, linux-raid@vger.kernel.org, linux-mtd@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov, Serge Hallyn , Andy Lutomirski , linux-kernel@vger.kernel.org, "Theodore Ts'o" From: Austin S Hemmelgarn Message-ID: <564B941A.2070601@gmail.com> Date: Tue, 17 Nov 2015 15:54:50 -0500 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <20151117191606.GC108807@ubuntu-hedt> Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-512; boundary="------------ms060202010605010001020909" X-Antivirus: avast! (VPS 151117-1, 2015-11-17), Outbound message X-Antivirus-Status: Clean Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 7094 Lines: 123 This is a cryptographically signed message in MIME format. --------------ms060202010605010001020909 Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: quoted-printable On 2015-11-17 14:16, Seth Forshee wrote: > On Tue, Nov 17, 2015 at 02:02:09PM -0500, Austin S Hemmelgarn wrote: >> On 2015-11-17 12:55, Al Viro wrote: >>> On Tue, Nov 17, 2015 at 11:25:51AM -0600, Seth Forshee wrote: >>> >>>> Shortly after that I plan to follow with support for ext4. I've been= >>>> fuzzing ext4 for a while now and it has held up well, and I'm curren= tly >>>> working on hand-crafted attacks. Ted has commented privately (to oth= ers, >>>> not to me personally) that he will fix bugs for such attacks, though= I >>>> haven't seen any public comments to that effect. >>> >>> _Static_ attacks, or change-image-under-mounted-fs attacks? >> To properly protect against attacks on mounted filesystems, we'd >> need some new concept of a userspace immutable file (that is, one >> where nobody can write to it except the kernel, and only the kernel >> can change it between regular access and this new state), and then >> have the kernel set an image (or block device) to this state when a >> filesystem is mounted from it (this introduces all kinds of other >> issues too however, for example stuff that allows an online fsck on >> the device will stop working, as will many un-deletion tools). > > Yeah, Serge and I were just tossing that idea around on irc. If we can > make that work then it's probably the best solution. > > From a naive perspective it seems like all we really have to do is mak= e > the block device inode immutable to userspace when it is mounted. And > the parent block device if it's a partition, which might be a bit > troublesome. We'd have to ensure that writes couldn't happen via any fd= s > already open when the device was mounted too. > > We'd need some cooperation from the loop driver too I suppose, to make > sure the file backing the loop device is also immutable. > From a completeness perspective, you'd also need to hook into DM, MD,=20 and bcache to handle their backing devices. There's not much we could=20 do about iSCSI/ATAoE/NBD devices, and I think being able to restrict=20 stuff calling mount from a userns to only be able to use FUSE would=20 still be useful (FWIW, GRUB2 has a tool to use FUSE for testing it's own = filesystem drivers, which I use regularly when I just need a read-only=20 mount). --------------ms060202010605010001020909 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIACAQExDzANBglghkgBZQMEAgMFADCABgkqhkiG9w0BBwEAAKCC Brgwgga0MIIEnKADAgECAgMRLfgwDQYJKoZIhvcNAQENBQAweTEQMA4GA1UEChMHUm9vdCBD QTEeMBwGA1UECxMVaHR0cDovL3d3dy5jYWNlcnQub3JnMSIwIAYDVQQDExlDQSBDZXJ0IFNp Z25pbmcgQXV0aG9yaXR5MSEwHwYJKoZIhvcNAQkBFhJzdXBwb3J0QGNhY2VydC5vcmcwHhcN MTUwOTIxMTEzNTEzWhcNMTYwMzE5MTEzNTEzWjBjMRgwFgYDVQQDEw9DQWNlcnQgV29UIFVz ZXIxIzAhBgkqhkiG9w0BCQEWFGFoZmVycm9pbjdAZ21haWwuY29tMSIwIAYJKoZIhvcNAQkB FhNhaGVtbWVsZ0BvaGlvZ3QuY29tMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA nQ/81tq0QBQi5w316VsVNfjg6kVVIMx760TuwA1MUaNQgQ3NyUl+UyFtjhpkNwwChjgAqfGd LIMTHAdObcwGfzO5uI2o1a8MHVQna8FRsU3QGouysIOGQlX8jFYXMKPEdnlt0GoQcd+BtESr pivbGWUEkPs1CwM6WOrs+09bAJP3qzKIr0VxervFrzrC5Dg9Rf18r9WXHElBuWHg4GYHNJ2V Ab8iKc10h44FnqxZK8RDN8ts/xX93i9bIBmHnFfyNRfiOUtNVeynJbf6kVtdHP+CRBkXCNRZ qyQT7gbTGD24P92PS2UTmDfplSBcWcTn65o3xWfesbf02jF6PL3BCrVnDRI4RgYxG3zFBJuG qvMoEODLhHKSXPAyQhwZINigZNdw5G1NqjXqUw+lIqdQvoPijK9J3eijiakh9u2bjWOMaleI SMRR6XsdM2O5qun1dqOrCgRkM0XSNtBQ2JjY7CycIx+qifJWsRaYWZz0aQU4ZrtAI7gVhO9h pyNaAGjvm7PdjEBiXq57e4QcgpwzvNlv8pG1c/hnt0msfDWNJtl3b6elhQ2Pz4w/QnWifZ8E BrFEmjeeJa2dqjE3giPVWrsH+lOvQQONsYJOuVb8b0zao4vrWeGmW2q2e3pdv0Axzm/60cJQ haZUv8+JdX9ZzqxOm5w5eUQSclt84u+D+hsCAwEAAaOCAVkwggFVMAwGA1UdEwEB/wQCMAAw VgYJYIZIAYb4QgENBEkWR1RvIGdldCB5b3VyIG93biBjZXJ0aWZpY2F0ZSBmb3IgRlJFRSBo ZWFkIG92ZXIgdG8gaHR0cDovL3d3dy5DQWNlcnQub3JnMA4GA1UdDwEB/wQEAwIDqDBABgNV HSUEOTA3BggrBgEFBQcDBAYIKwYBBQUHAwIGCisGAQQBgjcKAwQGCisGAQQBgjcKAwMGCWCG SAGG+EIEATAyBggrBgEFBQcBAQQmMCQwIgYIKwYBBQUHMAGGFmh0dHA6Ly9vY3NwLmNhY2Vy dC5vcmcwMQYDVR0fBCowKDAmoCSgIoYgaHR0cDovL2NybC5jYWNlcnQub3JnL3Jldm9rZS5j cmwwNAYDVR0RBC0wK4EUYWhmZXJyb2luN0BnbWFpbC5jb22BE2FoZW1tZWxnQG9oaW9ndC5j b20wDQYJKoZIhvcNAQENBQADggIBADMnxtSLiIunh/TQcjnRdf63yf2D8jMtYUm4yDoCF++J jCXbPQBGrpCEHztlNSGIkF3PH7ohKZvlqF4XePWxpY9dkr/pNyCF1PRkwxUURqvuHXbu8Lwn 8D3U2HeOEU3KmrfEo65DcbanJCMTTW7+mU9lZICPP7ZA9/zB+L0Gm1UNFZ6AU50N/86vjQfY WgkCd6dZD4rQ5y8L+d/lRbJW7ZGEQw1bSFVTRpkxxDTOwXH4/GpQfnfqTAtQuJ1CsKT12e+H NSD/RUWGTr289dA3P4nunBlz7qfvKamxPymHeBEUcuICKkL9/OZrnuYnGROFwcdvfjGE5iLB kjp/ttrY4aaVW5EsLASNgiRmA6mbgEAMlw3RwVx0sVelbiIAJg9Twzk4Ct6U9uBKiJ8S0sS2 8RCSyTmCRhJs0vvva5W9QUFGmp5kyFQEoSfBRJlbZfGX2ehI2Hi3U2/PMUm2ONuQG1E+a0AP u7I0NJc/Xil7rqR0gdbfkbWp0a+8dAvaM6J00aIcNo+HkcQkUgtfrw+C2Oyl3q8IjivGXZqT 5UdGUb2KujLjqjG91Dun3/RJ/qgQlotH7WkVBs7YJVTCxfkdN36rToPcnMYOI30FWa0Q06gn F6gUv9/mo6riv3A5bem/BdbgaJoPnWQD9D8wSyci9G4LKC+HQAMdLmGoeZfpJzKHMYIE0TCC BM0CAQEwgYAweTEQMA4GA1UEChMHUm9vdCBDQTEeMBwGA1UECxMVaHR0cDovL3d3dy5jYWNl cnQub3JnMSIwIAYDVQQDExlDQSBDZXJ0IFNpZ25pbmcgQXV0aG9yaXR5MSEwHwYJKoZIhvcN AQkBFhJzdXBwb3J0QGNhY2VydC5vcmcCAxEt+DANBglghkgBZQMEAgMFAKCCAiEwGAYJKoZI hvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTUxMTE3MjA1NDUwWjBPBgkq hkiG9w0BCQQxQgRAps0RsgJ4t+vsPoeUVaBjUJoX+9m4W9c5hgKwgGX0zHNjAbgx2T/2hyNB g1fqn2+oQc9cKsJNRYGDcZ0c52pspjBsBgkqhkiG9w0BCQ8xXzBdMAsGCWCGSAFlAwQBKjAL BglghkgBZQMEAQIwCgYIKoZIhvcNAwcwDgYIKoZIhvcNAwICAgCAMA0GCCqGSIb3DQMCAgFA MAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMIGRBgkrBgEEAYI3EAQxgYMwgYAweTEQMA4GA1UE ChMHUm9vdCBDQTEeMBwGA1UECxMVaHR0cDovL3d3dy5jYWNlcnQub3JnMSIwIAYDVQQDExlD QSBDZXJ0IFNpZ25pbmcgQXV0aG9yaXR5MSEwHwYJKoZIhvcNAQkBFhJzdXBwb3J0QGNhY2Vy dC5vcmcCAxEt+DCBkwYLKoZIhvcNAQkQAgsxgYOggYAweTEQMA4GA1UEChMHUm9vdCBDQTEe MBwGA1UECxMVaHR0cDovL3d3dy5jYWNlcnQub3JnMSIwIAYDVQQDExlDQSBDZXJ0IFNpZ25p bmcgQXV0aG9yaXR5MSEwHwYJKoZIhvcNAQkBFhJzdXBwb3J0QGNhY2VydC5vcmcCAxEt+DAN BgkqhkiG9w0BAQEFAASCAgAwHSzKFReD/yPqH2/a2zPoTPXytoCejgKcFCIpx58EmXj7K9n/ 9cuAe4Qv/4UAucbmuYpR0gtTLuA0qGvOK8DVDier24gj49kJb42QTV8iy1PiKx3gbgcTuDOB xf9nVTGlnFhT2+AhS61LCMEAu37BoHlDOdg4PthkVSOK2M8sXf0bhCBycxHBqSW6/lgxHnnb vgSVgKoRewGdU0JzCKcKdJft4rcpRprpO6RsfNOOud15vD85lki8IL4LBmXmUnUCulMWGfFi FVxMQvNkgKpSino2WbxHxpRx1W+GgyS7bLPnDrx3mTjYWvEPeMNkx8PU5MlByRA4iuXspyZg J9i6tvd5p6ojtOP5HH5ra0eX9l3SiDfC+Kk71A8I0ug7nhn7pqT2Dm8gWB86CCpQmpnb0/Fi KrPDqU3CrpJpHT9JhrzRHBTLHkyT0hdbn0vWGDaVy3JfFrS6IOKwFHGhpodHGHqGLpL3t9Aq 7y0vv7I5OZhjs/kYaKcInBETKn+lfIXSAHEs4qFlK6VP8twqi/2sOtTQtgdnY2M+mxPJ4mYu KVvgxTgvexoppt6dHDUPeKO4nBBAYVNL7GH3jf0MMhzELFz8lLlpVIEjR4C5YiwhV9dJmRvx R+hunVbxq7pTPRjYdvG521lWQhAESMn0x1N3QTSNMObtaJFBA3kWRNILhQAAAAAAAA== --------------ms060202010605010001020909-- -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/