Received: by 2002:a05:6358:e9c4:b0:b2:91dc:71ab with SMTP id hc4csp5296664rwb; Mon, 8 Aug 2022 16:19:45 -0700 (PDT) X-Google-Smtp-Source: AA6agR5RJm+KphDU+uLrvHMf6PB3H1B1uSeFqVzhyUj0aVi318r81svjMbib29FYnp7A7wam2QUu X-Received: by 2002:a17:907:60d1:b0:72f:42a0:f3f9 with SMTP id hv17-20020a17090760d100b0072f42a0f3f9mr15691163ejc.727.1660000785042; Mon, 08 Aug 2022 16:19:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660000785; cv=none; d=google.com; s=arc-20160816; b=Pwv2hdHt2AOh8pFSGSNE74HnWRYZC1D14z8Wdb1t0SstG1Asy5QfRiscH3CyDHgy8X NGZEysh0jqbNmAybppGc5CC0+FPwVjVmBhiMJxDllHaY9w1+M/gmuTMaNLcQsGzp/Z55 b5ToE3mLPfIOFMI9/vuctNbNAJOgoByrQrm/5YG1+L9Ncrg0RUFdplTj5bjkxCA5LbxI 7UszgpTeGhS5lp10CvZPORYXlWTMN0keFlVnGH/eOAsgP2kpWtrrVLF+bodaM0zWxOYj Z/uJvQ93FKD+y0Bf96mnlMD+asgSaaT1BCSETd58r0f8rvpQJO1zu2B3+wys3cu9dGPR wVhw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=Xgr1zcvVw2pumc5i5OyXUSrHvFDN2EKwHe94fGDtFRc=; b=tkLOiXi3IpOWlGqlZswV3AII+/RN55G+QnMatFURNRevkcV5EbdRvLxRaKwD/9PGe4 9QxBytAOU5nrs6/ilfbRlhZizifs6VbBwxSQHWhe+AjR8ZOD06l3A+eX99SG0M1qzIDk MvsIvWmOAclQoum2GOZDyVsd87aPzXi1JQC6zVMcW5q8SWlfZwVKsGvcxQq7tCIdwmkG 2DGHuOwcFA8xLBSXOK7vfJKYsZVpe9MK7qfC9QGYWRidezrSS9M8n4CGCPeHKUkJ34Wg O8AK62O0EoLJRUAOWoRPTb3xXveEgylBBY9yw4EKwZCmIJC2+lapDq9K+dgNz40AUdk+ drAQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20210112.gappssmtp.com header.s=20210112 header.b=SpIxuRBy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hp9-20020a1709073e0900b0072ef491cc0dsi832976ejc.113.2022.08.08.16.19.20; Mon, 08 Aug 2022 16:19:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20210112.gappssmtp.com header.s=20210112 header.b=SpIxuRBy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244496AbiHHWri (ORCPT + 99 others); Mon, 8 Aug 2022 18:47:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39252 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244304AbiHHWrg (ORCPT ); Mon, 8 Aug 2022 18:47:36 -0400 Received: from mail-oa1-x2f.google.com (mail-oa1-x2f.google.com [IPv6:2001:4860:4864:20::2f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BDE1018E2D for ; Mon, 8 Aug 2022 15:47:32 -0700 (PDT) Received: by mail-oa1-x2f.google.com with SMTP id 586e51a60fabf-10ea7d8fbf7so12145220fac.7 for ; Mon, 08 Aug 2022 15:47:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc; bh=Xgr1zcvVw2pumc5i5OyXUSrHvFDN2EKwHe94fGDtFRc=; b=SpIxuRBySHLiJnzlZCqbG6d10oLBSB6+sdgZ2x0xGqg9Qwam4ErXCCwXAKSMe60/qQ LXKVAHne5E6sMcti6T8BzKOmUlluVg+91nYIVsD/0Gx3/1Rh2GpuPw9yoGoFsgMlDreE Hyl7ji9Dex0sOxkL7gyZ6yKDSJMbl0988qMpWHJVC/avb0dk6uwrDgie4XTtnptBThSh Up1jSUYskmN+BE7RpU+76YeIe2h9UEMKds5itTlwRZM2KUpbnrIwFoatEQqlk2f3vpqS XUCZ38YIDNDrGV3oUTW23sBHHU+JWpi09zppu2VYozxXeu5uN48iLjgdfOfOEWtu5/ZA oTxA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc; bh=Xgr1zcvVw2pumc5i5OyXUSrHvFDN2EKwHe94fGDtFRc=; b=Kf5o44S+jDJeCY93t4+6nxNyQjN7mr3cqmAe9l1jVFMoxwxC5Y2gvJNW720wphf9OP a7BXPn7jHO3feugLXSA/dGnZK56JCsF4LyaLJxXVoGFYyxxTRrOa3Am0Xgs91WKLlk3W nW1BBW6Hx8/nF0DzoUswaK+hFgP2ERDysJ9sLmwmzd1XjZVddzOJq0yVPkj2DbV0pUUw rXD44XMzqrQjlJXqjgxOWTMIDQhnqxIYdnh6F4IgZkEcr8pM+rgBvKqfJD2HAgxScb9R xKuHjX0uO3kb4TAL1qQJryDVNPM7Kz965ZOSId6LUdvyWMV3kPx6pPVDwKbiQ5jUSMrA KiZA== X-Gm-Message-State: ACgBeo3eaSHEBeeYi8rtmk7f9nOKLiuFkqok0229jy+6RutO7uG2V/Zi L25PxEeKYG2D+y6hK4prbcZ6uPCokk8NCOum9Pst X-Received: by 2002:a05:6870:b41e:b0:116:5dc7:192a with SMTP id x30-20020a056870b41e00b001165dc7192amr2571672oap.136.1659998852083; Mon, 08 Aug 2022 15:47:32 -0700 (PDT) MIME-Version: 1.0 References: <20220801180146.1157914-1-fred@cloudflare.com> <87les7cq03.fsf@email.froward.int.ebiederm.org> <87wnbia7jh.fsf@email.froward.int.ebiederm.org> <877d3ia65v.fsf@email.froward.int.ebiederm.org> <87bksu8qs2.fsf@email.froward.int.ebiederm.org> In-Reply-To: <87bksu8qs2.fsf@email.froward.int.ebiederm.org> From: Paul Moore Date: Mon, 8 Aug 2022 18:47:21 -0400 Message-ID: Subject: Re: [PATCH v4 0/4] Introduce security_create_user_ns() To: "Eric W. Biederman" Cc: Frederick Lawler , kpsingh@kernel.org, revest@chromium.org, jackmanb@chromium.org, ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, kafai@fb.com, songliubraving@fb.com, yhs@fb.com, john.fastabend@gmail.com, jmorris@namei.org, serge@hallyn.com, stephen.smalley.work@gmail.com, eparis@parisplace.org, shuah@kernel.org, brauner@kernel.org, casey@schaufler-ca.com, bpf@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, kernel-team@cloudflare.com, cgzones@googlemail.com, karl@bigbadwolfsecurity.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Aug 8, 2022 at 3:43 PM Eric W. Biederman wrote: > "Eric W. Biederman" writes: > > Paul Moore writes: > > > >>> I did provide constructive feedback. My feedback to his problem > >>> was to address the real problem of bugs in the kernel. > >> > >> We've heard from several people who have use cases which require > >> adding LSM-level access controls and observability to user namespace > >> creation. This is the problem we are trying to solve here; if you do > >> not like the approach proposed in this patchset please suggest another > >> implementation that allows LSMs visibility into user namespace > >> creation. > > > > Please stop, ignoring my feedback, not detailing what problem or > > problems you are actually trying to be solved, and threatening to merge > > code into files that I maintain that has the express purpose of breaking > > my users. > > > > You just artificially constrained the problems, so that no other > > solution is acceptable. On that basis alone I am object to this whole > > approach to steam roll over me and my code. > > If you want an example of what kind of harm it can cause to introduce a > failure where no failure was before I invite you to look at what > happened with sendmail when setuid was modified to fail, when changing > the user of a process would cause RLIMIT_NPROC to be exceeded. I think we are all familiar with the sendmail capabilities bug and the others like it, but using that as an excuse to block additional access controls seems very weak. The Linux Kernel is very different from when the sendmail bug hit (what was that, ~20 years ago?), with advancements in capabilities and other discretionary controls, as well as mandatory access controls which have enabled Linux to be certified through a number of third party security evaluations. > I am not arguing that what you are proposing is that bad but unexpected > failures cause real problems, and at a minimum that needs a better > response than: "There is at least one user that wants a failure here". Let me fix that for you: "There are multiple users who want to have better visibility and access control for user namespace creation." -- paul-moore.com