Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp1548719ybe; Fri, 6 Sep 2019 21:11:12 -0700 (PDT) X-Google-Smtp-Source: APXvYqy2XSzDaBZaHbiiDw3N5HmcUJLhJK0sQwZONjiUo/3lPtiw+Oi/n2JvChC+Ri9UjnEYJC9A X-Received: by 2002:a5d:91c8:: with SMTP id k8mr1945555ior.232.1567829472694; Fri, 06 Sep 2019 21:11:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567829472; cv=none; d=google.com; s=arc-20160816; b=TZ9gv8To2Fc3IKBW5AdEZ4/Vtj0a9tVnpNVFRoXckmQHonT1tn8zDagihgHHb8kxKU zeJFQrdo/DpXTd4Sv3iaU1PZ6+Q+Wp1yIO2lcRK5hp34R5l++UxdTlPn2QmOF40rFLIw A3WwLm7BKJuKu2gQw2yyBvIor2PsS3X7eR/Z5OQbDooqxnXFYJ3reobBs19g2BuuYN68 nRWJeBsdhG/ARdzse772yKj2sYW35gMdtPh/kmQHaT/d8z/fwT1Yom6Oi6GlIm8C6KE/ zzep+IzJYiYRTHqOFQxeyl3sn3N/6hWgND9RZGaXTbcwQuDzLO+2klZ9RolaODI6k6+y OZYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=q0UGSKwdaz3plqApiMD93lLwD50kMSyd1D7zMI3A4qU=; b=pRGX9LBhz/EAy3N2jDZ25xSQPQQSM3006VRbUDiso6nWI714uFYXY+4b+6YrnGNNS5 awCBYYPnLBwjC0KW6IEh/6JPmp5GkzCzTvmgbbMfnxeQpGunc3eBr0M2oZzqC1fQuAbs HiNGu/Ijztshaom57FW5AFj97iylwX/+KrijzBgdhLEO34Ii8Pfx32Ut3dJrOIgoRHoU B9FwrHP6s6pZ34sfmqLZuhJ/vLlYEHzD1ljFARHU7rK6xo3cCXXBSb43hWpjbX+cKgZl r1exN2u/Iuxn+X4w+SZ4vhJvD0n5zvpFSUAfJKT6Wtm3J2ZQS6z6fsi1msGcUo4wrLy+ IvQw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y81si11279799iof.40.2019.09.06.21.10.58; Fri, 06 Sep 2019 21:11:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405752AbfIFP0r (ORCPT + 99 others); Fri, 6 Sep 2019 11:26:47 -0400 Received: from smtp-sh2.infomaniak.ch ([128.65.195.6]:45307 "EHLO smtp-sh2.infomaniak.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404214AbfIFP0i (ORCPT ); Fri, 6 Sep 2019 11:26:38 -0400 Received: from smtp5.infomaniak.ch (smtp5.infomaniak.ch [83.166.132.18]) by smtp-sh2.infomaniak.ch (8.14.4/8.14.4/Debian-8+deb8u2) with ESMTP id x86FP19F085657 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 6 Sep 2019 17:25:01 +0200 Received: from localhost (ns3096276.ip-94-23-54.eu [94.23.54.103]) (authenticated bits=0) by smtp5.infomaniak.ch (8.14.5/8.14.5) with ESMTP id x86FOt6E047234; Fri, 6 Sep 2019 17:24:55 +0200 From: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= To: linux-kernel@vger.kernel.org Cc: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= , Aleksa Sarai , Alexei Starovoitov , Al Viro , Andy Lutomirski , Christian Heimes , Daniel Borkmann , Eric Chiang , Florian Weimer , James Morris , Jan Kara , Jann Horn , Jonathan Corbet , Kees Cook , Matthew Garrett , Matthew Wilcox , Michael Kerrisk , =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= , Mimi Zohar , =?UTF-8?q?Philippe=20Tr=C3=A9buchet?= , Scott Shell , Sean Christopherson , Shuah Khan , Song Liu , Steve Dower , Steve Grubb , Thibaut Sautereau , Vincent Strubel , Yves-Alexis Perez , kernel-hardening@lists.openwall.com, linux-api@vger.kernel.org, linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: [PATCH v2 0/5] Add support for O_MAYEXEC Date: Fri, 6 Sep 2019 17:24:50 +0200 Message-Id: <20190906152455.22757-1-mic@digikod.net> X-Mailer: git-send-email 2.23.0.rc1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Antivirus: Dr.Web (R) for Unix mail servers drweb plugin ver.6.0.2.8 X-Antivirus-Code: 0x100000 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, The goal of this patch series is to control script interpretation. A new O_MAYEXEC flag used by sys_open() is added to enable userspace script interpreter to delegate to the kernel (and thus the system security policy) the permission to interpret/execute scripts or other files containing what can be seen as commands. This second series mainly differ from the previous one [1] by moving the basic security policy from Yama to the filesystem subsystem. This policy can be enforced by the system administrator through a sysctl configuration consistent with the mount points. Furthermore, the security policy can also be delegated to an LSM, either a MAC system or an integrity system. For instance, the new kernel MAY_OPENEXEC flag closes a major IMA measurement/appraisal interpreter integrity gap by bringing the ability to check the use of scripts [2]. Other uses are expected, such as for openat2(2) [3], SGX integration [4], and bpffs [5]. Userspace need to adapt to take advantage of this new feature. For example, the PEP 578 [6] (Runtime Audit Hooks) enables Python 3.8 to be extended with policy enforcement points related to code interpretation, which can be used to align with the PowerShell audit features. Additional Python security improvements (e.g. a limited interpreter withou -c, stdin piping of code) are on their way. The initial idea come from CLIP OS and the original implementation has been used for more than 10 years: https://github.com/clipos-archive/clipos4_doc An introduction to O_MAYEXEC was given at the Linux Security Summit Europe 2018 - Linux Kernel Security Contributions by ANSSI: https://www.youtube.com/watch?v=chNjCRtPKQY&t=17m15s The "write xor execute" principle was explained at Kernel Recipes 2018 - CLIP OS: a defense-in-depth OS: https://www.youtube.com/watch?v=PjRE0uBtkHU&t=11m14s This patch series can be applied on top of v5.3-rc7. This can be tested with CONFIG_SYSCTL. I would really appreciate constructive comments on this patch series. # Changes since v1 * move code from Yama to the FS subsystem * set __FMODE_EXEC when using O_MAYEXEC to make this information available through the new fanotify/FAN_OPEN_EXEC event * only match regular files (not directories nor other types), which follows the same semantic as commit 73601ea5b7b1 ("fs/open.c: allow opening only regular files during execve()") * improve tests [1] https://lore.kernel.org/lkml/20181212081712.32347-1-mic@digikod.net/ [2] https://lore.kernel.org/lkml/1544647356.4028.105.camel@linux.ibm.com/ [3] https://lore.kernel.org/lkml/20190904201933.10736-6-cyphar@cyphar.com/ [4] https://lore.kernel.org/lkml/CALCETrVovr8XNZSroey7pHF46O=kj_c5D9K8h=z2T_cNrpvMig@mail.gmail.com/ [5] https://lore.kernel.org/lkml/CALCETrVeZ0eufFXwfhtaG_j+AdvbzEWE0M3wjXMWVEO7pj+xkw@mail.gmail.com/ [6] https://www.python.org/dev/peps/pep-0578/ Regards, Mickaël Salaün (5): fs: Add support for an O_MAYEXEC flag on sys_open() fs: Add a MAY_EXECMOUNT flag to infer the noexec mount propertie fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC selftest/exec: Add tests for O_MAYEXEC enforcing doc: Add documentation for the fs.open_mayexec_enforce sysctl Documentation/admin-guide/sysctl/fs.rst | 43 +++ fs/fcntl.c | 2 +- fs/namei.c | 70 +++++ fs/open.c | 6 + include/linux/fcntl.h | 2 +- include/linux/fs.h | 7 + include/uapi/asm-generic/fcntl.h | 3 + kernel/sysctl.c | 7 + tools/testing/selftests/exec/.gitignore | 1 + tools/testing/selftests/exec/Makefile | 4 +- tools/testing/selftests/exec/omayexec.c | 317 ++++++++++++++++++++ tools/testing/selftests/kselftest_harness.h | 3 + 12 files changed, 462 insertions(+), 3 deletions(-) create mode 100644 tools/testing/selftests/exec/omayexec.c -- 2.23.0