Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1069249imm; Wed, 10 Oct 2018 08:40:44 -0700 (PDT) X-Google-Smtp-Source: ACcGV60DrEDoKy8NTHaMmQ633rVZUmvI7Q9C0Lu4ZuiopN+ju+FktaLd2+cV4BjROXC+HXioWArr X-Received: by 2002:a17:902:9693:: with SMTP id n19-v6mr33975464plp.282.1539186044565; Wed, 10 Oct 2018 08:40:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539186044; cv=none; d=google.com; s=arc-20160816; b=nsqQF+CID6VvChPwz8B/dTWLdCksmXgdxMK+kx4TQ2SaTY293p/J0HK23l0K2tWwia HMGNcogPTJ/2YSP4Uq+YPz2/9/xEf26iP+v8nLWRJCd3t/Sq7jdVikqTPhOVoZ04wBnZ F3Kxd5CTLw0yC6ZDttHbDCD6g/Va2iI6MjtadFDsUHKn+kAJLm06qWeGuiyIeMykzZb/ zHhrKfJCwV9s2jlWVqGOMsfqBbS87XX9KxcfBlzqhuMsQsElSsu4Rfx4CDhjpgDXAJh5 6LJuT4qC7W7D42qIWMAPoWb2iO5NycfKR17MGZxesOmyd8ycHUBmH0BkCsV6SAWqZM8t mvwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=fAK0fd5Pnirywsi1jbuQN2nikliGn4iYyXWcayP4N6s=; b=Go07XPEvNHebM+e4iap+twSjNboaBRd0Ju3X2+ig0S/V5VRigtP+esk9caoYeMBQ0C qISzYEOOYurN2Cq0UcK/n/7HBRQO3G3zpZu+PQ8rIOZvXz0Gu/zsLodrb8WhQUsmj+sf 8bcm7WHDn2ztMf4iaGtlJZJCsPsrqB9VSPAv+7s2DK3tSQucjnIxjJGOfXk0RBi7hY3H bDR2dv2MgzeyPiFN0NdZYngmvJmE87eiE+bRZA5YHQfzYt3e9pgiqCyyAoiKhnbLEdhP pXKKZnsZ4qVqDuonFyhDXBpEgnFzRRpweRJnzy9VDxqV2AkaPZX0A9v8fdRiWAv274g2 9RXA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@brauner.io header.s=google header.b=CqDVsKP7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s130-v6si29442242pfc.81.2018.10.10.08.40.29; Wed, 10 Oct 2018 08:40:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@brauner.io header.s=google header.b=CqDVsKP7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726689AbeJJXCv (ORCPT + 99 others); Wed, 10 Oct 2018 19:02:51 -0400 Received: from mail-wr1-f66.google.com ([209.85.221.66]:38972 "EHLO mail-wr1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726525AbeJJXCv (ORCPT ); Wed, 10 Oct 2018 19:02:51 -0400 Received: by mail-wr1-f66.google.com with SMTP id 61-v6so6269594wrb.6 for ; Wed, 10 Oct 2018 08:40:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=brauner.io; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=fAK0fd5Pnirywsi1jbuQN2nikliGn4iYyXWcayP4N6s=; b=CqDVsKP7Z3JHzBCDN5t/emK0S5VMgjGfZ8M/91PAMcjnYexKnFuqvdRLgFkbeVYV8f DbxJV/WkzjHWDz0MLKyA34VHEDjyI0xcheL4PS3mXVMCj5B+pydOTL302UbeDLDi2i6W bpNjNg3vOFyLRjnl7C0erWyouz1aaNOmOx81sxYGAhRBkRAMFkA9DSUQtebmqE8jTxBz TD4lc6JXYh9PSmbUr7qypYhJUPXKTK8jlsxCZZH1wr/6+yZeJxqKQSunECqhSz1eVTR0 //RHNqgzs8nhBe5T5p8+C+MoXg34QnKD1k5Psee926PCdGzqrn0JOY9YfJDQLlVRMeQa 0KjQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=fAK0fd5Pnirywsi1jbuQN2nikliGn4iYyXWcayP4N6s=; b=IqCGC3JG92yjHJbh6zRiDmpxzt+v+l18qJBxPD6m1zgatRFScvlvry4Ygjm0504Ll7 J+/NjLUGGX74QebSWy4aXgboErOFMK1c+5pmlEUJfyAFQRlU3TQghsgx3ClbPknzZVqD sVCwPvdUag69NyiG/s4MI2AI6Xca3Pt12LEGHV8whA3KSD/n2DQWBzk1fI1E1h9dbvc7 N3v5+Eygz3nwCwXy9pSXHkau2s6ZYUbqaJvvcsrDstRfQtLQiCLx8wu1yMWeK/PMtiWT iUZZbJ7KxNYBvocsDCYVRbEfxQjUvJX+vi/WkECDkrIMyyzeSMsBPnfikzNg7x1Dh3rh 9yzg== X-Gm-Message-State: ABuFfogFOJcXK6zK8DRybTXH7lHEysY/pBEQ4us5+PEZprpg7XcUhtwT 4N0fxIp0UiLKSqRbyLatBNmCBA== X-Received: by 2002:adf:f4c3:: with SMTP id h3-v6mr18353453wrp.259.1539186004953; Wed, 10 Oct 2018 08:40:04 -0700 (PDT) Received: from brauner.io ([2a02:8070:8895:9700:8197:8849:535a:4f00]) by smtp.gmail.com with ESMTPSA id 16-v6sm26994761wrb.95.2018.10.10.08.40.03 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 10 Oct 2018 08:40:04 -0700 (PDT) Date: Wed, 10 Oct 2018 17:39:57 +0200 From: Christian Brauner To: Jann Horn Cc: Paul Moore , Tycho Andersen , Kees Cook , Linux API , containers@lists.linux-foundation.org, suda.akihiro@lab.ntt.co.jp, Oleg Nesterov , kernel list , "Eric W. Biederman" , linux-fsdevel@vger.kernel.org, Christian Brauner , Andy Lutomirski , linux-security-module , selinux@tycho.nsa.gov, Stephen Smalley , Eric Paris Subject: Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace Message-ID: <20181010153956.zzlatxdlcwolbs6k@brauner.io> References: <20181008151629.hkgzzsluevwtuclw@brauner.io> <20181008162147.ubfxxsv2425l2zsp@brauner.io> <20181008181815.pwnqxngj22mhm2vj@brauner.io> <20181009132850.fp6yne2vgmfpi27k@brauner.io> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 10, 2018 at 05:33:43PM +0200, Jann Horn wrote: > On Wed, Oct 10, 2018 at 5:32 PM Paul Moore wrote: > > On Tue, Oct 9, 2018 at 9:36 AM Jann Horn wrote: > > > +cc selinux people explicitly, since they probably have opinions on this > > > > I just spent about twenty minutes working my way through this thread, > > and digging through the containers archive trying to get a good > > understanding of what you guys are trying to do, and I'm not quite > > sure I understand it all. However, from what I have seen, this > > approach looks very ptrace-y to me (I imagine to others as well based > > on the comments) and because of this I think ensuring the usual ptrace > > access controls are evaluated, including the ptrace LSM hooks, is the > > right thing to do. > > Basically the problem is that this new ptrace() API does something > that doesn't just influence the target task, but also every other task > that has the same seccomp filter. So the classic ptrace check doesn't > work here. Just to throw this into the mix: then maybe ptrace() isn't the right interface and we should just go with the native seccomp() approach for now. > > > If I've missed something, or I'm thinking about this wrong, please > > educate me; just a heads-up that I'm largely offline for most of this > > week so responses on my end are going to be delayed much more than > > usual. > > > > > On Tue, Oct 9, 2018 at 3:29 PM Christian Brauner wrote: > > > > On Tue, Oct 09, 2018 at 02:39:53PM +0200, Jann Horn wrote: > > > > > On Mon, Oct 8, 2018 at 8:18 PM Christian Brauner wrote: > > > > > > On Mon, Oct 08, 2018 at 06:42:00PM +0200, Jann Horn wrote: > > > > > > > On Mon, Oct 8, 2018 at 6:21 PM Christian Brauner wrote: > > > > > > > > On Mon, Oct 08, 2018 at 05:33:22PM +0200, Jann Horn wrote: > > > > > > > > > On Mon, Oct 8, 2018 at 5:16 PM Christian Brauner wrote: > > > > > > > > > > On Thu, Sep 27, 2018 at 09:11:16AM -0600, Tycho Andersen wrote: > > > > > > > > > > > diff --git a/kernel/seccomp.c b/kernel/seccomp.c > > > > > > > > > > > index 44a31ac8373a..17685803a2af 100644 > > > > > > > > > > > --- a/kernel/seccomp.c > > > > > > > > > > > +++ b/kernel/seccomp.c > > > > > > > > > > > @@ -1777,4 +1777,35 @@ static struct file *init_listener(struct task_struct *task, > > > > > > > > > > > > > > > > > > > > > > return ret; > > > > > > > > > > > } > > > > > > > > > > > + > > > > > > > > > > > +long seccomp_new_listener(struct task_struct *task, > > > > > > > > > > > + unsigned long filter_off) > > > > > > > > > > > +{ > > > > > > > > > > > + struct seccomp_filter *filter; > > > > > > > > > > > + struct file *listener; > > > > > > > > > > > + int fd; > > > > > > > > > > > + > > > > > > > > > > > + if (!capable(CAP_SYS_ADMIN)) > > > > > > > > > > > + return -EACCES; > > > > > > > > > > > > > > > > > > > > I know this might have been discussed a while back but why exactly do we > > > > > > > > > > require CAP_SYS_ADMIN in init_userns and not in the target userns? What > > > > > > > > > > if I want to do a setns()fd, CLONE_NEWUSER) to the target process and > > > > > > > > > > use ptrace from in there? > > > > > > > > > > > > > > > > > > See https://lore.kernel.org/lkml/CAG48ez3R+ZJ1vwGkDfGzKX2mz6f=jjJWsO5pCvnH68P+RKO8Ow@mail.gmail.com/ > > > > > > > > > . Basically, the problem is that this doesn't just give you capability > > > > > > > > > over the target task, but also over every other task that has the same > > > > > > > > > filter installed; you need some sort of "is the caller capable over > > > > > > > > > the filter and anyone who uses it" check. > > > > > > > > > > > > > > > > Thanks. > > > > > > > > But then this new ptrace feature as it stands is imho currently broken. > > > > > > > > If you can install a seccomp filter with SECCOMP_RET_USER_NOTIF if you > > > > > > > > are ns_cpabable(CAP_SYS_ADMIN) and also get an fd via seccomp() itself > > > > > > > > if you are ns_cpabable(CAP_SYS_ADMIN) > > > > > > > > > > Actually, you don't need CAP_SYS_ADMIN for seccomp() at all as long as > > > > > you enable the NNP flag, I think? > > > > > > > > Yes, if you turn on NNP you don't even need sys_admin. > > > > > > > > > > > > > > > > > then either the new ptrace() api > > > > > > > > extension should be fixed to allow for this too or the seccomp() way of > > > > > > > > retrieving the pid - which I really think we want - needs to be fixed to > > > > > > > > require capable(CAP_SYS_ADMIN) too. > > > > > > > > The solution where both require ns_capable(CAP_SYS_ADMIN) is - imho - > > > > > > > > the preferred way to solve this. > > > > > > > > Everything else will just be confusing. > > > > > > > > > > > > > > First you say "broken", then you say "confusing". Which one do you mean? > > > > > > > > > > > > Both. It's broken in so far as it places a seemingly unnecessary > > > > > > restriction that could be fixed. You outlined one possible fix yourself > > > > > > in the link you provided. > > > > > > > > > > If by "possible fix" you mean "check whether the seccomp filter is > > > > > only attached to a single task": That wouldn't fundamentally change > > > > > the situation, it would only add an additional special case. > > > > > > > > > > > And it's confusing in so far as there is a way > > > > > > via seccomp() to get the fd without said requirement. > > > > > > > > > > I don't find it confusing at all. seccomp() and ptrace() are very > > > > > > > > Fine, then that's a matter of opinion. I find it counterintuitive that > > > > you can get an fd without privileges via one interface but not via > > > > another. > > > > > > > > > different situations: When you use seccomp(), infrastructure is > > > > > > > > Sure. Note, that this is _one_ of the reasons why I want to make sure we > > > > keep the native seccomp() only based way of getting an fd without > > > > forcing userspace to switching to a differnet kernel api. > > > > > > > > > already in place for ensuring that your filter is only applied to > > > > > processes over which you are capable, and propagation is limited by > > > > > inheritance from your task down. When you use ptrace(), you need a > > > > > pretty different sort of access check that checks whether you're > > > > > privileged over ancestors, siblings and so on of the target task. > > > > > > > > So, don't get me wrong I'm not arguing against the ptrace() interface in > > > > general. If this is something that people find useful, fine. But, I > > > > would like to have a simple single-syscall pure-seccomp() based way of > > > > getting an fd, i.e. what we have in patch 1 of this series. > > > > > > Yeah, I also prefer the seccomp() one. > > > > > > > > But thinking about it more, I think that CAP_SYS_ADMIN over the saved > > > > > current->mm->user_ns of the task that installed the filter (stored as > > > > > a "struct user_namespace *" in the filter) should be acceptable. > > > > > > > > Hm... Why not CAP_SYS_PTRACE? > > > > > > Because LSMs like SELinux add extra checks that apply even if you have > > > CAP_SYS_PTRACE, and this would subvert those. The only capability I > > > know of that lets you bypass LSM checks by design (if no LSM blocks > > > the capability itself) is CAP_SYS_ADMIN. > > > > > > > One more thing. Citing from [1] > > > > > > > > > I think there's a security problem here. Imagine the following scenario: > > > > > > > > > > 1. task A (uid==0) sets up a seccomp filter that uses SECCOMP_RET_USER_NOTIF > > > > > 2. task A forks off a child B > > > > > 3. task B uses setuid(1) to drop its privileges > > > > > 4. task B becomes dumpable again, either via prctl(PR_SET_DUMPABLE, 1) > > > > > or via execve() > > > > > 5. task C (the attacker, uid==1) attaches to task B via ptrace > > > > > 6. task C uses PTRACE_SECCOMP_NEW_LISTENER on task B > > > > > > > > Sorry, to be late to the party but would this really pass > > > > __ptrace_may_access() in ptrace_attach()? It doesn't seem obvious to me > > > > that it would... Doesn't look like it would get past: > > > > > > > > tcred = __task_cred(task); > > > > if (uid_eq(caller_uid, tcred->euid) && > > > > uid_eq(caller_uid, tcred->suid) && > > > > uid_eq(caller_uid, tcred->uid) && > > > > gid_eq(caller_gid, tcred->egid) && > > > > gid_eq(caller_gid, tcred->sgid) && > > > > gid_eq(caller_gid, tcred->gid)) > > > > goto ok; > > > > if (ptrace_has_cap(tcred->user_ns, mode)) > > > > goto ok; > > > > rcu_read_unlock(); > > > > return -EPERM; > > > > ok: > > > > rcu_read_unlock(); > > > > mm = task->mm; > > > > if (mm && > > > > ((get_dumpable(mm) != SUID_DUMP_USER) && > > > > !ptrace_has_cap(mm->user_ns, mode))) > > > > return -EPERM; > > > > > > Which specific check would prevent task C from attaching to task B? If > > > the UIDs match, the first "goto ok" executes; and you're dumpable, so > > > you don't trigger the second "return -EPERM". > > > > > > > > 7. because the seccomp filter is shared by task A and task B, task C > > > > > is now able to influence syscall results for syscalls performed by > > > > > task A > > > > > > > > [1]: https://lore.kernel.org/lkml/CAG48ez3R+ZJ1vwGkDfGzKX2mz6f=jjJWsO5pCvnH68P+RKO8Ow@mail.gmail.com/ > > > > > > > > -- > > paul moore > > www.paul-moore.com