Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp1581859rwd; Thu, 1 Jun 2023 18:48:13 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4AEVgx/IxAKtFG8rScuVqsGAVkRHpiorWjROpksr5YXRb34ArrM7Fjno5DCTVmHIfop19I X-Received: by 2002:a17:902:d50f:b0:1b0:663e:4b3f with SMTP id b15-20020a170902d50f00b001b0663e4b3fmr984435plg.37.1685670493361; Thu, 01 Jun 2023 18:48:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685670493; cv=none; d=google.com; s=arc-20160816; b=YNXVCPg1i+aSCA3nUlHBRHH5rIWOnwGLpYGLJpCI3AShoYYfKKYolv0Z8393RZHwzg DYAWeBNTE/6ZyBOOAbIkdVmFHXo9uFnqhzVwwMitEYKhw1W24Dz0ilkXf1fxJxsQMdRZ nftQaCAhcpoM3jr7rwMkfcDZzyXKrKhXtO1Aw60Pdr+q2luo2K80v4yZKtpgQBVxOiUe E9wcIBNaSzeV/kK42Gte+7i0/DrLM/EpoBXeCTx2eL+O1dvRQYI1HaL+Z51WJ3OZcs7u zqa8Xs2F3WSUQ9Y9bPp9TrXYaYBUBhv8wlUpcUzdo8MtDlvZQ2nBuXcg1cqUVmOK7gYK 6L1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:subject:content-transfer-encoding:mime-version :user-agent:message-id:in-reply-to:date:references:cc:to:from; bh=6ot/Ss6CSDKahZQQ5LLnW7sdshPqcAMB5n4TK6GqcTo=; b=JW2U3FCSJ6TJ3l5A8Xl1GoxtwWOWj1lPS08c5q9x/itWB076swXs8fp1cjTVCS47RN nxSHSIf9Mk/BQiXQNE1lXFbckqTibcZ8RKj5kvMBPy81hP5feKkcBP4gl22ymKYy+old +9/iNhx0mW5LP10kTg9vqZ5U3kQg3bMTMI4I1reI8+ZmWdB/e0D2AteGKt9n/hizp13I 9/0i2I9soEizcTH9BgAtzaDIOck5nJlvwjx0TKMZkh7d6Y+N6H7ZOqY81nlE7KaTqb4O kWU1ky1aS3unj61CQwvnkkw6Aq0UXMAS+6AN8ZVO6yUdL9g70VgthQID+zuWPSUApsNc E1Ow== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y19-20020a170902ed5300b001b06fa47450si28802plb.531.2023.06.01.18.48.02; Thu, 01 Jun 2023 18:48:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233698AbjFBBl4 convert rfc822-to-8bit (ORCPT + 99 others); Thu, 1 Jun 2023 21:41:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34752 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233609AbjFBBlz (ORCPT ); Thu, 1 Jun 2023 21:41:55 -0400 Received: from out01.mta.xmission.com (out01.mta.xmission.com [166.70.13.231]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EEA1E97 for ; Thu, 1 Jun 2023 18:41:52 -0700 (PDT) Received: from in02.mta.xmission.com ([166.70.13.52]:52334) by out01.mta.xmission.com with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1q4tna-004fqV-3x; Thu, 01 Jun 2023 19:41:50 -0600 Received: from ip68-110-29-46.om.om.cox.net ([68.110.29.46]:56980 helo=email.froward.int.ebiederm.org.xmission.com) by in02.mta.xmission.com with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1q4tnY-0034gx-SS; Thu, 01 Jun 2023 19:41:49 -0600 From: "Eric W. Biederman" To: Paul Moore Cc: "~akihirosuda" , linux-kernel@vger.kernel.org, containers@lists.linux.dev, serge@hallyn.com, brauner@kernel.org, akihiro.suda.cz@hco.ntt.co.jp References: <168547265011.24337.4306067683997517082-0@git.sr.ht> <87fs7abu0f.fsf@email.froward.int.ebiederm.org> Date: Thu, 01 Jun 2023 20:41:42 -0500 In-Reply-To: (Paul Moore's message of "Thu, 1 Jun 2023 21:01:55 -0400") Message-ID: <87ilc67i95.fsf@email.froward.int.ebiederm.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT X-XM-SPF: eid=1q4tnY-0034gx-SS;;;mid=<87ilc67i95.fsf@email.froward.int.ebiederm.org>;;;hst=in02.mta.xmission.com;;;ip=68.110.29.46;;;frm=ebiederm@xmission.com;;;spf=pass X-XM-AID: U2FsdGVkX19VrZxVOemsucyaabfl73Cwk/oBg1+agj4= X-SA-Exim-Connect-IP: 68.110.29.46 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net X-Spam-Level: X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-DCC: XMission; sa04 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: ;Paul Moore X-Spam-Relay-Country: X-Spam-Timing: total 661 ms - load_scoreonly_sql: 0.06 (0.0%), signal_user_changed: 13 (2.0%), b_tie_ro: 11 (1.7%), parse: 1.45 (0.2%), extract_message_metadata: 24 (3.6%), get_uri_detail_list: 1.70 (0.3%), tests_pri_-2000: 22 (3.3%), tests_pri_-1000: 3.2 (0.5%), tests_pri_-950: 1.66 (0.3%), tests_pri_-900: 1.31 (0.2%), tests_pri_-200: 1.03 (0.2%), tests_pri_-100: 4.4 (0.7%), tests_pri_-90: 155 (23.4%), check_bayes: 123 (18.6%), b_tokenize: 7 (1.0%), b_tok_get_all: 7 (1.0%), b_comp_prob: 2.5 (0.4%), b_tok_touch_all: 103 (15.6%), b_finish: 1.18 (0.2%), tests_pri_0: 413 (62.5%), check_dkim_signature: 0.98 (0.1%), check_dkim_adsp: 4.7 (0.7%), poll_dns_idle: 0.57 (0.1%), tests_pri_10: 2.3 (0.3%), tests_pri_500: 14 (2.1%), rewrite_mail: 0.00 (0.0%) Subject: Re: [PATCH linux 0/3] [PATCH] userns: add sysctl "kernel.userns_group_range" X-SA-Exim-Version: 4.2.1 (built Sat, 08 Feb 2020 21:53:50 +0000) X-SA-Exim-Scanned: Yes (on in02.mta.xmission.com) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Paul Moore writes: > On Thu, Jun 1, 2023 at 8:14 PM Eric W. Biederman wrote: >> Paul Moore writes: >> > >> > Given the challenges around adding access controls to userns >> > operations, have you considered using the LSM support that was added >> > upstream last year? The relevant LSM hook can be found in commit >> > 7cd4c5c2101c ("security, lsm: Introduce security_create_user_ns()"), >> >> Paul how have you handled the real world regression I reported against >> chromium? > > I don't track chromium development. You have chosen to be the maintainer and I reported it to you. >> Paul are you aware that the LSM hook can not be used to achieve the >> objective of this patchset? > > /me shrugs > [snip parts about performing a group id check] The LSM hook you added does not have the technical capability to reduce the attack surface to mitigate bugs in the kernel. It is the ineffectiveness of the hook not the permission check that I was referring to. Eric