Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1165976pxb; Fri, 21 Jan 2022 11:15:11 -0800 (PST) X-Google-Smtp-Source: ABdhPJyoJfiAaXOq1GtoEul0/udwyAShnlxspd2ys4tvfJ2sZCAhndffOiRSplGNbmgoey0StbAA X-Received: by 2002:a65:6799:: with SMTP id e25mr3984384pgr.614.1642792511212; Fri, 21 Jan 2022 11:15:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642792511; cv=none; d=google.com; s=arc-20160816; b=uPpgxDn27miuZhNtV2WNt0JREElKGYM7D6aOKvdeP3LSmU59ewuPl60/tivXsqrJn6 xh7qE62XWQUFbKndIYdZclxofWJvR+IGzFNEK2mpakIVY73EgtyB1nKTIGiPSAEdovlk zFaAmtBPqPg5BTMBVjudBrTrH7PnzjoJA/8/r17i15r1u0jJ4d1zQ/dVfrlxBkJc+8CB JaDv3oZCcrZYV7TRj17xNWjWok8HrPl9pTV8ju3kEkph1EikRxT4t3vyujyRcGO96eSh /CoP2ORCbAsTGVPKVMfBcxArNqjgFsnHQff4dkD5TL05rXnKNZ5E1Qp4cSTqhyB59x+w O8LA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=6yzDw/gpAJiqHTep4LgtMJ0ZuVvn8GL6qyJEFI+xT78=; b=Bwubn3G9Ej/klHI44baz4g1Q13vWleUe41lODsGtFwVHIC0rxCK6oEtjVa73ppsLRs QfI7k2FYZexueVbgAjBVGGJLlgUgkUtatuOTSMRqNgZUVT6QrIrXf6CSgcE60ihR84+a bnrE7f+TTEQZ4CfDznD736NPVYPa++3EAXv/sDEREC5cW7M9FN/5rFkjwE2Dq8YKFl1e JGQBne4U6IOIdMqWQ1LkL6zUXm7G6RAZuxPKK4ZKKlTP0Q9KJAbrOhSM/U1oZIdntwTT oeNEl/Zr8sv9JNruRPLblYb0tRcBdOAva1uqL/G3CBG0Q8bbZ2nmxq8oAsIcWtNyPMp+ a03A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=NQ5k6Kzm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u12si7602568pfk.356.2022.01.21.11.14.59; Fri, 21 Jan 2022 11:15:11 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=NQ5k6Kzm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1348798AbiASMpm (ORCPT + 99 others); Wed, 19 Jan 2022 07:45:42 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:2106 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245463AbiASMpl (ORCPT ); Wed, 19 Jan 2022 07:45:41 -0500 Received: from pps.filterd (m0187473.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 20JASJH3039141; Wed, 19 Jan 2022 12:45:27 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=message-id : date : mime-version : subject : to : cc : references : from : in-reply-to : content-type : content-transfer-encoding; s=pp1; bh=6yzDw/gpAJiqHTep4LgtMJ0ZuVvn8GL6qyJEFI+xT78=; b=NQ5k6KzmtuA7k/CW8J+sllm50GwE77ycRyG1ZgwKwQH1JKd05Zk5qDhT9c0jU3GgSUXT HxQ9scwAgo8/ddXacBSGEXjFbTCmtehY88/tP6s7XXZ6IbX7fpBDYr9KAvjsVj+3UJi1 ZtGluArXCX4p3maC/N0e8BMo+Dw9UuL6eYdDBnRGvH8SNw4/ivgsHz5EawPSK8DWLGXC Hs+R75EBgTEJuD0aCtrqv6Uo1ImlgtOc5wPD2PsHVPLRMmUaoJyVMLlPBqW0ZDfN7qSF ytVJeOiwyQQBiPZ5b0O+iMITJr0A5IgSbleXZUgZldCa6govDXpCnFxsOCWxtcjO+a3v yQ== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com with ESMTP id 3dpgwyahhf-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 19 Jan 2022 12:45:27 +0000 Received: from m0187473.ppops.net (m0187473.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.43/8.16.0.43) with SMTP id 20JCjQNe014414; Wed, 19 Jan 2022 12:45:26 GMT Received: from ppma04dal.us.ibm.com (7a.29.35a9.ip4.static.sl-reverse.com [169.53.41.122]) by mx0a-001b2d01.pphosted.com with ESMTP id 3dpgwyahh0-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 19 Jan 2022 12:45:26 +0000 Received: from pps.filterd (ppma04dal.us.ibm.com [127.0.0.1]) by ppma04dal.us.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 20JChffG013665; Wed, 19 Jan 2022 12:45:25 GMT Received: from b01cxnp23032.gho.pok.ibm.com (b01cxnp23032.gho.pok.ibm.com [9.57.198.27]) by ppma04dal.us.ibm.com with ESMTP id 3dknwbgje6-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 19 Jan 2022 12:45:25 +0000 Received: from b01ledav006.gho.pok.ibm.com (b01ledav006.gho.pok.ibm.com [9.57.199.111]) by b01cxnp23032.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 20JCjNPR35455432 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 19 Jan 2022 12:45:23 GMT Received: from b01ledav006.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 45DAFAC06A; Wed, 19 Jan 2022 12:45:23 +0000 (GMT) Received: from b01ledav006.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id BD211AC05E; Wed, 19 Jan 2022 12:45:22 +0000 (GMT) Received: from [9.47.158.152] (unknown [9.47.158.152]) by b01ledav006.gho.pok.ibm.com (Postfix) with ESMTP; Wed, 19 Jan 2022 12:45:22 +0000 (GMT) Message-ID: Date: Wed, 19 Jan 2022 07:45:22 -0500 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.3.0 Subject: Re: [PATCH v8 19/19] ima: Enable IMA namespaces Content-Language: en-US To: Christian Brauner Cc: Stefan Berger , linux-integrity@vger.kernel.org, zohar@linux.ibm.com, serge@hallyn.com, christian.brauner@ubuntu.com, containers@lists.linux.dev, dmitry.kasatkin@gmail.com, ebiederm@xmission.com, krzysztof.struczynski@huawei.com, roberto.sassu@huawei.com, mpeters@redhat.com, lhinds@redhat.com, lsturman@redhat.com, puiterwi@redhat.com, jejb@linux.ibm.com, jamjoom@us.ibm.com, linux-kernel@vger.kernel.org, paul@paul-moore.com, rgb@redhat.com, linux-security-module@vger.kernel.org, jmorris@namei.org References: <20220104170416.1923685-1-stefanb@linux.vnet.ibm.com> <20220104170416.1923685-20-stefanb@linux.vnet.ibm.com> <20220114144515.vbler7ae3jqebhec@wittgenstein> <8f7e0bcc-cd7c-723d-c544-300b5e8f3873@linux.ibm.com> <20220119094613.cxxxmz5qbuehd7c3@wittgenstein> From: Stefan Berger In-Reply-To: <20220119094613.cxxxmz5qbuehd7c3@wittgenstein> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 X-Proofpoint-GUID: IExwXAEo3gIY2aVYt0igMMKKWRK9XsxE X-Proofpoint-ORIG-GUID: DVxWANrqBnT629G0Cf_Wb-jQ35DIhlee X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.816,Hydra:6.0.425,FMLib:17.11.62.513 definitions=2022-01-19_07,2022-01-19_01,2021-12-02_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 priorityscore=1501 impostorscore=0 mlxlogscore=999 lowpriorityscore=0 bulkscore=0 spamscore=0 clxscore=1015 mlxscore=0 adultscore=0 suspectscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2110150000 definitions=main-2201190072 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/19/22 04:46, Christian Brauner wrote: > On Tue, Jan 18, 2022 at 01:09:12PM -0500, Stefan Berger wrote: >> On 1/14/22 09:45, Christian Brauner wrote: >>> On Tue, Jan 04, 2022 at 12:04:16PM -0500, Stefan Berger wrote: >>>> From: Stefan Berger >>>> >>>> Introduce the IMA_NS in Kconfig for IMA namespace enablement. >>>> >>>> Enable the lazy initialization of an IMA namespace when a user mounts >>>> SecurityFS. Now a user_namespace will get a pointer to an ima_namespace >>>> and therefore add an implementation of get_current_ns() that returns this >>>> pointer. >>>> >>>> get_current_ns() may now return a NULL pointer for as long as the IMA >>>> namespace hasn't been created, yet. Therefore, return early from those >>>> functions that may now get a NULL pointer from this call. The NULL >>>> pointer can typically be treated similar to not having an IMA policy set >>>> and simply return early from a function. >>>> >>>> Implement ima_ns_from_file() for SecurityFS-related files where we can >>>> now get the IMA namespace via the user namespace pointer associated >>>> with the superblock of the SecurityFS filesystem instance. Since >>>> the functions using ima_ns_from_file() will only be called after an >>>> ima_namesapce has been allocated they will never get a NULL pointer >>>> for the ima_namespace. >>>> >>>> Switch access to userns->ima_ns to use acquire/release semantics to ensure >>>> that a newly created ima_namespace structure is fully visible upon access. >>>> >>>> Replace usage of current_user_ns() with ima_ns_from_user_ns() that >>>> implements a method to derive the user_namespace from the given >>>> ima_namespace. It leads to the same result. >>>> >>>> Signed-off-by: Stefan Berger >>>> --- >> [...] >>>> diff --git a/security/integrity/ima/ima_policy.c b/security/integrity/ima/ima_policy.c >>>> index b7dbc687b6ff..5a9b511ebbae 100644 >>>> --- a/security/integrity/ima/ima_policy.c >>>> +++ b/security/integrity/ima/ima_policy.c >>>> @@ -1333,6 +1333,7 @@ static unsigned int ima_parse_appraise_algos(char *arg) >>>> static int ima_parse_rule(struct ima_namespace *ns, >>>> char *rule, struct ima_rule_entry *entry) >>>> { >>>> + struct user_namespace *user_ns = ima_ns_to_user_ns(ns); >>> So I think ima_policy_write() and therefore ima_parse_rule() can >>> legitimately be reached at least from an ancestor userns but also from a >>> completely unrelated userns via securityfs. Sorry, I didn't see this >>> earlier. Think of the following two scenarios: >>> >>> * userns1: unshare -U --map-root --mount >>> ----------------------------------------- >>> mount -t securityfs securityfs /userns1_securityfs >>> fd_in_userns1 = open("/userns1_securityfs/ima_file, O_RDWR); >>> >>> /* I _think_ that sending of fds here should work but I haven't >>> * bothered to recheck the scm code as I need to do some driving in a >>> * little bit so I'm running out of time... >>> */ >>> send_fd_scm_rights(fd_in_userns1, task_in_userns2); >>> >>> * userns2: unshare -U --map-root --mount >>> ----------------------------------------- >>> fd_from_userns1 = receive_fd_scm_rights(); >>> write_policy(fd_from_userns1, "my fancy policy"); >> Passing an fd around like this presumably indicates that you intend to let >> the recipient read/write to it. > Yes. > >> >>> It also means that if you inherit an fd from a more privileged imans >>> instance you can write to it: >> Now in this example we have to assume that root is making a mistake passing >> the file descriptor around? >> >> # ls -l /sys/kernel/security/ima/ >> total 0 >> -r--r-----. 1 root root 0 Jan 18 12:48 ascii_runtime_measurements >> -r--r-----. 1 root root 0 Jan 18 12:48 binary_runtime_measurements >> -rw-------. 1 root root 0 Jan 18 12:48 policy >> -r--r-----. 1 root root 0 Jan 18 12:48 runtime_measurements_count >> -r--r-----. 1 root root 0 Jan 18 12:48 violations >> >>> * initial_userns: >> >> So that's the host, right? And this is a 2nd independent example from the >> first. > Yes, these are just two examples to give a more complete idea of the > semantics by specifying two cases and how ima would behave. > >>> ------------------ >>> mount -t securityfs securityfs /initial_securityfs >>> >>> fd_in_initial_securityfs = open("/initial_securityfs/ima_file, O_RDWR); >>> >>> pid = fork(): >>> if (pid == 0) { >>> unshare(CLONE_NEWUSER); >>> /* write idmapping for yourself */ >>> >>> write_policy(fd_in_initial_securityfs, "my fancy policy"); >>> } >>> >>> would allow an unprivileged caller to alter the host's ima policy (as >>> you can see the example requires cooperation). >> Sorry, not currently following. Root is the only one being able to open that >> IMA files on the host, right? Is this a mistake here where root passed the > Yes. > >> fd onto the child and that child is not trusted to mess with the fd >> including passing it on further? > This is just an example what the current semantics mean in practice. > The above code snippet is neither good nor bad by itself as that depends > on context: > > 1) Let's say for whatever reason you would like to let unprivileged > containers add policy rules (sorry in case I'm using the wrong ima > vernacular) for themselves to the initial ima namespace during > startup. That can be a rather valid and important use-case. Then this > code snipped above where root opens a policy fd in the host > securityfs instance and then let's the container access it across > fork() + post namespace creation is "good" as it will allow the > container to write the rules during setup while e.g. letting the > container manager process (the code prior to fork) continue doing > other stuff. I would agree to supporting passing the fd to other containers to have them add rules to the policy, if that's what is intended. > > 2) If you only want to ever allow container manager on the host write > rules for the container in the initial ima ns but never the container > setup process itself then the above code is "bad". The policy fd > should've been closed before the fork() and definitely be opened > o-cloexec. I would treat the IMA files' file descriptors like those of fd = open("/top/secret/file", O_RDWR) assuming the programmer knows the implications of passing the fd around, including knowing that open fds are inherited by child processes... I don't see that there's anything wrong with that. > > The examples really were just trying to make obvious what the semantics > are that you're buying.