From: Aleksa Sarai <cyphar@cyphar.com>
To: Christian Brauner <christian.brauner@ubuntu.com>
Cc: Andrey Zhadchenko <andrey.zhadchenko@virtuozzo.com>,
linux-fsdevel@vger.kernel.org, viro@zeniv.linux.org.uk,
ptikhomirov@virtuozzo.com, linux-api@vger.kernel.org
Subject: Re: [PATCH] fs/open: add new RESOLVE_EMPTY_PATH flag for openat2
Date: Fri, 14 Jan 2022 01:44:58 +1100 [thread overview]
Message-ID: <20220113144458.vpqlowweiiqkxgsc@senku> (raw)
In-Reply-To: <20220113140556.asn5sbeyisegb44h@wittgenstein>
[-- Attachment #1: Type: text/plain, Size: 9411 bytes --]
On 2022-01-13, Christian Brauner <christian.brauner@ubuntu.com> wrote:
> On Thu, Jan 13, 2022 at 05:46:43PM +1100, Aleksa Sarai wrote:
> > On 2022-01-12, Andrey Zhadchenko <andrey.zhadchenko@virtuozzo.com> wrote:
> > > On 1/12/22 17:51, Christian Brauner wrote:
> > > > On Thu, Jan 13, 2022 at 01:34:19AM +1100, Aleksa Sarai wrote:
> > > > > On 2022-01-12, Andrey Zhadchenko <andrey.zhadchenko@virtuozzo.com> wrote:
> > > > > > If you have an opened O_PATH file, currently there is no way to re-open
> > > > > > it with other flags with openat/openat2. As a workaround it is possible
> > > > > > to open it via /proc/self/fd/<X>, however
> > > > > > 1) You need to ensure that /proc exists
> > > > > > 2) You cannot use O_NOFOLLOW flag
> > > > >
> > > > > There is also another issue -- you can mount on top of magic-links so if
> > > > > you're a container runtime that has been tricked into creating bad
> > > > > mounts of top of /proc/ subdirectories there's no way of detecting that
> > > > > this has happened. (Though I think in the long-term we will need to
> > > > > make it possible for unprivileged users to create a procfs mountfd if
> > > > > they have hidepid=4,subset=pids set -- there are loads of things
> > > > > containers need to touch in procfs which can be overmounted in malicious
> > > > > ways.)
> > > >
> > > > Yeah, though I see this as a less pressing issue for now. I'd rather
> > > > postpone this and make userspace work a bit more. There are ways to
> > > > design programs so you know that the procfs instance you're interacting
> > > > with is the one you want to interact with without requiring unprivileged
> > > > mounting outside of a userns+pidns+mountns pair. ;)
> > > >
> > > > >
> > > > > > Both problems may look insignificant, but they are sensitive for CRIU.
> > > > > > First of all, procfs may not be mounted in the namespace where we are
> > > > > > restoring the process. Secondly, if someone opens a file with O_NOFOLLOW
> > > > > > flag, it is exposed in /proc/pid/fdinfo/<X>. So CRIU must also open the
> > > > > > file with this flag during restore.
> > > > > >
> > > > > > This patch adds new constant RESOLVE_EMPTY_PATH for resolve field of
> > > > > > struct open_how and changes getname() call to getname_flags() to avoid
> > > > > > ENOENT for empty filenames.
> > > > >
> > > > > This is something I've wanted to implement for a while, but from memory
> > > > > we need to add some other protections in place before enabling this.
> > > > >
> > > > > The main one is disallowing re-opening of a path when it was originally
> > > > > opened with a different set of modes. [1] is the patch I originally
> > > I looked at this patch. However I am not able to reproduce the problem.
> > > For example, I can't open /proc/self/exe as RDWR with the following:
> > > fd1 = open(/proc/self/exe, O_PATH)
> > > fd2 = open(/proc/self/fd/3, O_RDWR) <- error
> > > or open file with incorrect flags via O_PATH to O_PATH fd from proc
> > > This is fixed or did I understand this problem wrong?
> >
> > You will get -ETXTBSY because the /proc/self/exe is still a current->mm
> > of a process. What you need to do is have two processes (or fork+exec a
> > process and do this):
>
> Note that not too long ago someone proposed to remove the -ETXTBSY
> restriction and I argued against doing that in order to not make these
> attacks easier.
>
> >
> > 1. Grab the /proc/$pid/exe handle of the target process.
> > 2. Wait for the target process to do an exec() of another program (or
> > exit).
> > 3. *Then* re-open the fd with write permissions. This is allowed
> > because the file is no longer being used as the current->mm of a
> > process and thus is treated like a regular file handle even though
> > it was only ever resolveable through /proc/self/exe which should
> > (semantically) only ever be readable.
> >
> > This attack was used against runc in 2016 and a similar attack was
> > possible with some later CVEs (I think there was also one against LXC at
> > some point but I might be mistaken). There were other bugs which lead to
>
> (IIrc, it only affects privileged containers and we did write the fix for this
> together.)
>
> > this vector being usable, but my view is that this shouldn't have been
> > possible in the first place.
> >
> > I can cook up a simple example if the above description isn't explaining
> > the issue thoroughly enough.
> >
> > > > > wrote as part of the openat2(2) (but I dropped it since I wasn't sure
> > > > > whether it might break some systems in subtle ways -- though according
> > > > > to my testing there wasn't an issue on any of my machines).
> > > >
> > > > Oh this is the discussion we had around turning an opath fd into a say
> > > > O_RDWR fd, I think.
> > > > So yes, I think restricting fd reopening makes sense. However, going
> > > > from an O_PATH fd to e.g. an fd with O_RDWR does make sense and needs to
> > > > be the default anyway. So we would need to implement this as a denylist
> > > > anyway. The default is that opath fds can be reopened with whatever and
> > > > only if the opath creator has restricted reopening will it fail, i.e.
> > > > it's similar to a denylist.
> > > >
> > > > But this patch wouldn't prevent that or hinder the upgrade mask
> > > > restriction afaict.
> > >
> > > This issue is actually more complicated than I thought.
> > >
> > > What do you think of the following:
> > > 1. Add new O_EMPTYPATH constant
> > > 2. When we open something with O_PATH, remember access flags (currently
> > > we drop all flags in do_dentry_open() for O_PATH fds). This is similar
> > > to Aleksa Sarai idea, but I do not think we should add some new fields,
> > > because CRIU needs to be able to see it. Just leave access flags
> > > untouched.
> >
> > There are two problems with this:
> >
> > * The problem with this is that O_PATH and O_PATH|O_RDONLY are
> > identical. O_RDONLY is defined as 0. I guess by new fields you're
> > referring to what you'd get from fcntl(F_GETFL)?
> >
> > What you're suggesting here is the openat2() O_PATH access mask
> > stuff. That is a feature I think would be useful, but it's not
> > necessary to get O_EMPTYPATH working.
>
> Yes, that's crucial to notice. I don't think we need to make the
> patchsets dependent on each other which is what I mentioned in my
> earlier mail.
>
> >
> > If you really need to be able to get the O_PATH re-opening mask of a
> > file descriptor (which you probably do for CRIU) we can add that
> > information to F_GETFL or some other such interface.
>
> fcntl() would certainly be a sensible choice for that.
>
> >
> > * We need to make sure that the default access modes of O_PATH on
> > magic links are correct. We can't simply allow any access mode in
> > that case, because if we do then we haven't really solved the
> > /proc/self/exe issue.
>
> Or alternatively we make O_EMPTYPATH not work on magic links.
>
> >
> > > 3. for openat(fd, "", O_EMPTYPATH | <access flags>) additionally check
> > > access flags against the ones we remembered for O_PATH fd
> >
> > * We also need to add the same restrictions for opening through
> > /proc/self/fd/$n.
> >
> > > This won't solve magiclinks problems but there at least will be API to
> > > avoid procfs and which allow to add some restrictions.
> >
> > I think the magic link problems need to be solved if we're going to
> > enshrine this fd reopening behaviour by adding an O_* flag for it.
>
> As I understand it there are two naive options:
> 1. We do add O_EMPTYPATH before introducing upgrade masks. In this case
> O_EMPTYPATH would be unrestricted by default. Meaning, you can go
> from an O_PATH fd to an fd with any access mask.
> So after the introduction of upgrade masks, O_EMPTYPATH is restricted
> iff the O_PATH fd has opened with an upgrade mask.
> 2. We do introduce upgrade masks before introducing O_EMPTYPATH.
> Iiuc, we could then introduce O_EMPTYPATH in a more restricted
> manner such that O_EMPTYPATH will be restricted by default,
> i.e. it wouldn't allow reopening an O_PATH fd _unless_ an upgrade
> mask has been specified. The problem with this approach is that
> /proc/self/fd/$n would break that logic and we can't change that
> behavior without regressions.
> Additionally, this might make O_EMPTYPATH less useful for some users
> in case they are not in control of the O_PATH fd handed to them
> and the opener has not opened the O_PATH fd with an upgrade mask.
>
> So I think 2. is out of the question which means that we can add
> O_EMPTYPATH first or add upgrade masks first or together; it wouldn't
> really matter afaict.
Yeah agreed. (1) was what I had planned originally. O_EMPTYPATH should
be identical semantically to /proc/self/fd/$n (both for the API's sanity
and our own). It also makes more sense to make upgrade_mask a deny list
because it makes it simpler to add new deny modes in the future (such as
denying exec permissions -- which isn't currently possible).
And yes, we should add upgrade_masks later.
--
Aleksa Sarai
Senior Software Engineer (Containers)
SUSE Linux GmbH
<https://www.cyphar.com/>
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 228 bytes --]
next prev parent reply other threads:[~2022-01-13 14:45 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-01-12 9:02 [PATCH] fs/open: add new RESOLVE_EMPTY_PATH flag for openat2 Andrey Zhadchenko
2022-01-12 14:34 ` Aleksa Sarai
2022-01-12 14:51 ` Christian Brauner
2022-01-12 18:56 ` Andrey Zhadchenko
2022-01-13 6:46 ` Aleksa Sarai
2022-01-13 7:52 ` Andrey Zhadchenko
2022-01-14 4:24 ` Andrey Zhadchenko
2022-01-14 4:28 ` Aleksa Sarai
2022-01-17 6:35 ` Andrey Zhadchenko
2022-01-13 14:05 ` Christian Brauner
2022-01-13 14:44 ` Aleksa Sarai [this message]
2022-01-13 6:55 ` Aleksa Sarai
2022-01-12 14:39 ` Christian Brauner
2022-01-12 14:43 ` Aleksa Sarai
2022-01-12 14:53 ` Christian Brauner
2022-01-12 17:45 ` Andrey Zhadchenko
2022-01-13 6:47 ` Aleksa Sarai
2022-01-13 10:33 ` Christian Brauner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20220113144458.vpqlowweiiqkxgsc@senku \
--to=cyphar@cyphar.com \
--cc=andrey.zhadchenko@virtuozzo.com \
--cc=christian.brauner@ubuntu.com \
--cc=linux-api@vger.kernel.org \
--cc=linux-fsdevel@vger.kernel.org \
--cc=ptikhomirov@virtuozzo.com \
--cc=viro@zeniv.linux.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox