Received: by 10.192.165.156 with SMTP id m28csp1617130imm; Wed, 18 Apr 2018 12:41:02 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/cRjortcrGQ0UZmDSai76K95YX0/rQJB+GWP3dFfunTByV8kX9CK6hRJs+rZiv7jPhSyJW X-Received: by 2002:a17:902:8481:: with SMTP id c1-v6mr3212665plo.310.1524080462618; Wed, 18 Apr 2018 12:41:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524080462; cv=none; d=google.com; s=arc-20160816; b=exSiqO82JwwMjJu/rbrqp5NK+5Sr1CLIK0r4YPvl0ESqusHHgVAxorARoWp/KjKMvF 2mbNJr0WdZHPKSJTl0u46+y827Lrpq82P/D/bSG03cDhd2wWIo0tkjGPa/SUM3z0nUUb ut+0akPfLf4qUxi3uDwTaibE5p1zKwPH2lGhvcqAoOZRfuSwaRejaqDbfD8bZuLZB6jj mZ7sJIjC5JlrTu/vcc6z/7vF8A+pS5FWn9u0osS721zQM7sBA/krVSMoLGZO8+A0zhXu oWQWnGkHlaizeJUOrelmEqt7xdRy8q0OrI9UFEbxFhDK7PNC2ir+1rQbD/04fXV7z8pa H95Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:from:cc:references:to :subject:arc-authentication-results; bh=erqQhfXY/VbLN/b4D3taaJqnRvTMPnlEC8/96iox+/0=; b=lVxOahdiSBsEsvxqCzZm894CTlGv6imB263E/C11e1Vh/dqOB6fTnZf1dpduvsdW9q beWbsoJFxNIW48XQmUvuNzZPxrTY3uKL6QQpsg3+MGie6C01IjWrzYFal0vutZxY9MuE I7PoHy7q+KxkAFppPfU8ZvkK1UgAV/Zf29OYA3P6AdQZ5uPW/+qvrtEGdiO6ZjEElYvb 4HY+Z6DplVLH9Xo+vzsTwmVELk0afG3KSJOdUDE7fgdWsb8QLKAaB41d83hE4rLmDzgU BFnHNCVk1/pydm8jRZiNtKhTm70Xz5aIy/snyqdEa7yoEt8EZX9Yh9Ters045/rcPTrW 14ig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x8-v6si1717081plw.251.2018.04.18.12.40.46; Wed, 18 Apr 2018 12:41:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752514AbeDRTjd (ORCPT + 99 others); Wed, 18 Apr 2018 15:39:33 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:44190 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752214AbeDRTjb (ORCPT ); Wed, 18 Apr 2018 15:39:31 -0400 Received: from pps.filterd (m0098420.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w3IJaFfD083930 for ; Wed, 18 Apr 2018 15:39:30 -0400 Received: from e18.ny.us.ibm.com (e18.ny.us.ibm.com [129.33.205.208]) by mx0b-001b2d01.pphosted.com with ESMTP id 2hea3qx5my-1 (version=TLSv1.2 cipher=AES256-SHA256 bits=256 verify=NOT) for ; Wed, 18 Apr 2018 15:39:28 -0400 Received: from localhost by e18.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 18 Apr 2018 15:39:27 -0400 Received: from b01cxnp23032.gho.pok.ibm.com (9.57.198.27) by e18.ny.us.ibm.com (146.89.104.205) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Wed, 18 Apr 2018 15:39:22 -0400 Received: from b01ledav004.gho.pok.ibm.com (b01ledav004.gho.pok.ibm.com [9.57.199.109]) by b01cxnp23032.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w3IJdLKm47906872; Wed, 18 Apr 2018 19:39:21 GMT Received: from b01ledav004.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id AEC0F112054; Wed, 18 Apr 2018 15:38:47 -0400 (EDT) Received: from sbct-3.pok.ibm.com (unknown [9.47.158.153]) by b01ledav004.gho.pok.ibm.com (Postfix) with ESMTP id 9658E112034; Wed, 18 Apr 2018 15:38:47 -0400 (EDT) Subject: Re: [RFC PATCH V1 01/12] audit: add container id To: Richard Guy Briggs References: <2e5d93ee46feca915a101c2fc3062da674a98223.1519930146.git.rgb@redhat.com> <216d1ab1-531b-9185-2e31-34f162f08aad@linux.vnet.ibm.com> <20180316035837.ddnqvbyrbp3fdk7e@madcap2.tricolour.ca> <20180418192359.n4q53bvsdhrjftjg@madcap2.tricolour.ca> Cc: mszeredi@redhat.com, ebiederm@xmission.com, simo@redhat.com, jlayton@redhat.com, carlos@redhat.com, linux-api@vger.kernel.org, containers@lists.linux-foundation.org, LKML , eparis@parisplace.org, dhowells@redhat.com, Linux-Audit Mailing List , viro@zeniv.linux.org.uk, luto@kernel.org, netdev@vger.kernel.org, linux-fsdevel@vger.kernel.org, cgroups@vger.kernel.org, serge@hallyn.com, trondmy@primarydata.com From: Stefan Berger Date: Wed, 18 Apr 2018 15:39:21 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 In-Reply-To: <20180418192359.n4q53bvsdhrjftjg@madcap2.tricolour.ca> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 18041819-0044-0000-0000-00000407604D X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00008878; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000257; SDB=6.01019830; UDB=6.00520310; IPR=6.00799072; MB=3.00020647; MTD=3.00000008; XFM=3.00000015; UTC=2018-04-18 19:39:26 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18041819-0045-0000-0000-0000083965AD Message-Id: X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-04-18_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1804180176 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/18/2018 03:23 PM, Richard Guy Briggs wrote: > On 2018-04-18 14:45, Stefan Berger wrote: >> On 03/15/2018 11:58 PM, Richard Guy Briggs wrote: >>> On 2018-03-15 16:27, Stefan Berger wrote: >>>> On 03/01/2018 02:41 PM, Richard Guy Briggs wrote: >>>>> Implement the proc fs write to set the audit container ID of a process, >>>>> emitting an AUDIT_CONTAINER record to document the event. >>>>> >>>>> This is a write from the container orchestrator task to a proc entry of >>>>> the form /proc/PID/containerid where PID is the process ID of the newly >>>>> created task that is to become the first task in a container, or an >>>>> additional task added to a container. >>>>> >>>>> The write expects up to a u64 value (unset: 18446744073709551615). >>>>> >>>>> This will produce a record such as this: >>>>> type=UNKNOWN[1333] msg=audit(1519903238.968:261): op=set pid=596 uid=0 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 auid=0 tty=pts0 ses=1 opid=596 old-contid=18446744073709551615 contid=123455 res=0 >>>>> >>>>> The "op" field indicates an initial set. The "pid" to "ses" fields are >>>>> the orchestrator while the "opid" field is the object's PID, the process >>>>> being "contained". Old and new container ID values are given in the >>>>> "contid" fields, while res indicates its success. >>>>> >>>>> It is not permitted to self-set, unset or re-set the container ID. A >>>>> child inherits its parent's container ID, but then can be set only once >>>>> after. >>>>> >>>>> See: https://github.com/linux-audit/audit-kernel/issues/32 >>>>> >>>>> >>>>> /* audit_rule_data supports filter rules with both integer and string >>>>> * fields. It corresponds with AUDIT_ADD_RULE, AUDIT_DEL_RULE and >>>>> diff --git a/kernel/auditsc.c b/kernel/auditsc.c >>>>> index 4e0a4ac..0ee1e59 100644 >>>>> --- a/kernel/auditsc.c >>>>> +++ b/kernel/auditsc.c >>>>> @@ -2073,6 +2073,92 @@ int audit_set_loginuid(kuid_t loginuid) >>>>> return rc; >>>>> } >>>>> >>>>> +static int audit_set_containerid_perm(struct task_struct *task, u64 containerid) >>>>> +{ >>>>> + struct task_struct *parent; >>>>> + u64 pcontainerid, ccontainerid; >>>>> + pid_t ppid; >>>>> + >>>>> + /* Don't allow to set our own containerid */ >>>>> + if (current == task) >>>>> + return -EPERM; >>>>> + /* Don't allow the containerid to be unset */ >>>>> + if (!cid_valid(containerid)) >>>>> + return -EINVAL; >>>>> + /* if we don't have caps, reject */ >>>>> + if (!capable(CAP_AUDIT_CONTROL)) >>>>> + return -EPERM; >>>>> + /* if containerid is unset, allow */ >>>>> + if (!audit_containerid_set(task)) >>>>> + return 0; >>>> I am wondering whether there should be a check for the target process that >>>> will receive the containerid to not have CAP_SYS_ADMIN that would otherwise >>>> allow it to arbitrarily unshare()/clone() and leave the set of namespaces >>>> that may make up the container whose containerid we assign here? >>> This is a reasonable question. This has been debated and I understood >>> the conclusion was that without a clear definition of a "container", the >>> task still remains in that container that just now has more >>> sub-namespaces (in the case of hierarchical namespaces), we don't want >>> to restrict it in such a way and that allows it to create nested >>> containers. I see setns being more problematic if it could switch to >>> another existing namespace that was set up by the orchestrator for a >>> different container. The coming v2 patchset acknowledges this situation >>> with the network namespace being potentially shared by multiple >>> containers. >> Are you going to post v2 soon? We would like to build on top of it for IMA >> namespacing and auditing inside of IMA namespaces. > I don't know if it addresses your specific needs, but V2 was posted on > March 16th along with userspace patches: > https://www.redhat.com/archives/linux-audit/2018-March/msg00110.html > https://www.redhat.com/archives/linux-audit/2018-March/msg00124.html > > V3 is pending. Thanks. I hadn't actually looked at primarily due to the ghak and ghau in the title. Whatever these may mean. Does V2 or will V3 prevent a privileged process to setns() to a whole different set of namespaces and still be audited with that initial container id ?