Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1760246Ab1D0X1a (ORCPT ); Wed, 27 Apr 2011 19:27:30 -0400 Received: from e33.co.us.ibm.com ([32.97.110.151]:51016 "EHLO e33.co.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757166Ab1D0X12 (ORCPT ); Wed, 27 Apr 2011 19:27:28 -0400 Date: Wed, 27 Apr 2011 18:27:19 -0500 From: Tyler Hicks To: Casey Schaufler Cc: Roberto Sassu , linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, dhowells@redhat.com, jmorris@namei.org, zohar@linux.vnet.ibm.com, safford@watson.ibm.com, kirkland@canonical.com, ecryptfs-devel@lists.launchpad.net, eparis@redhat.com, sds@tycho.nsa.gov, selinux@tycho.nsa.gov, viro@zeniv.linux.org.uk Subject: Re: [RFC][PATCH 0/7] File descriptor labeling Message-ID: <20110427232718.GG30854@boyd.l.tihix.com> References: <1303907657-18366-1-git-send-email-roberto.sassu@polito.it> <4DB87A6B.7060805@schaufler-ca.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4DB87A6B.7060805@schaufler-ca.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3645 Lines: 71 On Wed Apr 27, 2011 at 01:19:55PM -0700, Casey Schaufler wrote: > On 4/27/2011 5:34 AM, Roberto Sassu wrote: > > File descriptor labeling issue > > > > Actually SELinux and SMACK assign to file descriptors the same label of the > > opening process and use it in LSM hooks security_file_permission(), > > security_file_fcntl() and others to verify if the 'current' process has the > > rights to perform the requested operation. > > > > Using the credentials of the 'current' process may be not appropriate in > > case a file descriptor is opened by a kernel service (i.e. a filesystem) > > and made shared among user processes. For instance, in a system with > > SELinux and eCryptfs, if the process A opens an encrypted file, eCryptfs > > obtains a file descriptor to access the correspondent inode in the lower > > filesystem, labeled with the A's label. > > > > If the process B accesses the same encrypted file, it needs the 'use' > > permission on the A's label other than permissions for the lower inode. > > However, if B is the first accessing process, A needs the 'use' permission > > on the B's label. > > I am having trouble understanding the argument. I will pose my > question in Smack terms, as I can speak most definitively in them. > > A process running with a Smack label "A" creates a file, and that > file gets labeled "A", as it ought. If eCryptfs is behaving correctly > this ought not change. If eCryptfs in encrypting the label it needs > to do so in such a way as to be able to decrypt it prior to > presentation to the vfs layer, where it will be used in an access > check. When the process running with a Smack label "B" comes along > the vfs code will check the fetched and possibly decrypted "A" > against "B" and, unless there is an explicit Smack rule in place > granting "B" access to "A", fail. > > What is the problem? What is eCryptfs doing that prevents this > from working? Hi Casey - I think what Roberto is getting at is the way eCryptfs uses only one lower file per eCryptfs inode. Imagine that there are 5 files open for ~/secret/foo at the eCryptfs layer, only 1 file is going to be open in the lower filesystem and all eCryptfs file operations will be multiplexed through it. To make things more complicated, if the eCryptfs file is opened for writing, the lower file must be opened for reading and writing. This is because a write operation requires eCryptfs to vfs_read() from the lower filesystem, decrypt that data and then vfs_write() the new data. If the lower file can't be opened O_RDWR by the calling process, the request is handed off to a kernel thread to open the lower file on behalf of the calling process. It is definitely ugly. Roberto, I hope I correctly described the situation that you're trying to address. Can you tell me why we can't have a 1:1 mapping of eCryptfs files to lower files? Instead of having just one lower file attached to the eCryptfs inode, we could have a list of opened files. There would be one for each eCryptfs file that was opened. ecryptfs_writepage() would have to pick, in a somewhat random fashion, one of the lower files to use. Of course, we would still need to solve the problem of opening the lower file O_RDWR when the calling process is only allowed write access (I may have just answered my own question of why the 1:1 mapping technique won't solve this problem). Tyler -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/