* Trust model for raw QPs
@ 2012-08-15 13:28 Or Gerlitz
[not found] ` <502BA406.2060409-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 10+ messages in thread
From: Or Gerlitz @ 2012-08-15 13:28 UTC (permalink / raw)
To: Roland Dreier, Steve Wise
Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA, Christoph Lameter, Tzahi Oved
Currently, for an app to open a raw QP from user space, we (verbs)
require admin permission, for which we (Mellanox) got customer feedback
saying this is problematic on some of the environments.
Suppose we allow to user to provide source mac+vlan when creating the QP
or when modifying its state, and the HW can enforce that -- in that case
I think its OK to remove that restriction e.g ala what is allowed today
with user space UD QPs when the fabric is IB.
Or.
--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 10+ messages in thread[parent not found: <502BA406.2060409-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>]
* Re: Trust model for raw QPs [not found] ` <502BA406.2060409-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> @ 2012-08-15 13:40 ` Steve Wise [not found] ` <502BA6CD.9010308-7bPotxP6k4+P2YhJcF5u+vpXobYPEAuW@public.gmane.org> 2012-08-15 14:06 ` Christoph Lameter 2012-08-15 16:47 ` Jason Gunthorpe 2 siblings, 1 reply; 10+ messages in thread From: Steve Wise @ 2012-08-15 13:40 UTC (permalink / raw) To: Or Gerlitz Cc: Roland Dreier, linux-rdma-u79uwXL29TY76Z2rM5mHXA, Christoph Lameter, Tzahi Oved On 8/15/2012 8:28 AM, Or Gerlitz wrote: > Currently, for an app to open a raw QP from user space, we (verbs) > require admin permission, for which we (Mellanox) got customer > feedback saying this is problematic on some of the environments. > > Suppose we allow to user to provide source mac+vlan when creating the > QP or when modifying its state, and the HW can enforce that -- in that > case I think its OK to remove that restriction e.g ala what is allowed > today with user space UD QPs when the fabric is IB. > > Or. We have similar requirements from customers. I don't understand how mac+vlan allows the driver to enforce anything? Can you explain this further? Stevo -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <502BA6CD.9010308-7bPotxP6k4+P2YhJcF5u+vpXobYPEAuW@public.gmane.org>]
* Re: Trust model for raw QPs [not found] ` <502BA6CD.9010308-7bPotxP6k4+P2YhJcF5u+vpXobYPEAuW@public.gmane.org> @ 2012-08-15 13:48 ` Or Gerlitz 0 siblings, 0 replies; 10+ messages in thread From: Or Gerlitz @ 2012-08-15 13:48 UTC (permalink / raw) To: Steve Wise Cc: Roland Dreier, linux-rdma-u79uwXL29TY76Z2rM5mHXA, Christoph Lameter, Tzahi Oved On 15/08/2012 16:40, Steve Wise wrote: > On 8/15/2012 8:28 AM, Or Gerlitz wrote: >> Currently, for an app to open a raw QP from user space, we (verbs) >> require admin permission, for which we (Mellanox) got customer >> feedback saying this is problematic on some of the environments. >> >> Suppose we allow to user to provide source mac+vlan when creating the >> QP or when modifying its state, and the HW can enforce that -- in >> that case I think its OK to remove that restriction e.g ala what is >> allowed today with user space UD QPs when the fabric is IB. >> > We have similar requirements from customers. I don't understand how > mac+vlan allows the driver to enforce anything? Can you explain this > further? Its what's called HW anti spoofing support, very common in the virtualization world when you want te HW to enforce source mac/vlan for Ethernet frames sent by a VM using an SRIOV VF -- user-space is a private case of that very same problem. Its not driver enforcement, its driver advertizing the ability of the HW to enforce. Or. -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Trust model for raw QPs [not found] ` <502BA406.2060409-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> 2012-08-15 13:40 ` Steve Wise @ 2012-08-15 14:06 ` Christoph Lameter [not found] ` <000001392a9b6b2a-ba67aaa6-b7b8-4c80-90db-03f0172aef6e-000000-p/GC64/jrecnJqMo6gzdpkEOCMrvLtNR@public.gmane.org> 2012-08-15 16:47 ` Jason Gunthorpe 2 siblings, 1 reply; 10+ messages in thread From: Christoph Lameter @ 2012-08-15 14:06 UTC (permalink / raw) To: Or Gerlitz Cc: Roland Dreier, Steve Wise, linux-rdma-u79uwXL29TY76Z2rM5mHXA, Tzahi Oved On Wed, 15 Aug 2012, Or Gerlitz wrote: > Currently, for an app to open a raw QP from user space, we (verbs) require > admin permission, for which we (Mellanox) got customer feedback saying this is > problematic on some of the environments. Well yes it is but the kernel mod is a one line to get rid of this problem. > Suppose we allow to user to provide source mac+vlan when creating the QP or > when modifying its state, and the HW can enforce that -- in that case I think > its OK to remove that restriction e.g ala what is allowed today with user > space UD QPs when the fabric is IB. Well yes that would mean that the source mac and vlan are configured with admin permissions and then the app would run without within the constraints established in priviledged moded. -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <000001392a9b6b2a-ba67aaa6-b7b8-4c80-90db-03f0172aef6e-000000-p/GC64/jrecnJqMo6gzdpkEOCMrvLtNR@public.gmane.org>]
* Re: Trust model for raw QPs [not found] ` <000001392a9b6b2a-ba67aaa6-b7b8-4c80-90db-03f0172aef6e-000000-p/GC64/jrecnJqMo6gzdpkEOCMrvLtNR@public.gmane.org> @ 2012-08-15 14:28 ` Or Gerlitz 0 siblings, 0 replies; 10+ messages in thread From: Or Gerlitz @ 2012-08-15 14:28 UTC (permalink / raw) To: Christoph Lameter Cc: Roland Dreier, Steve Wise, linux-rdma-u79uwXL29TY76Z2rM5mHXA, Tzahi Oved On 15/08/2012 17:06, Christoph Lameter wrote: > On Wed, 15 Aug 2012, Or Gerlitz wrote: > >> Currently, for an app to open a raw QP from user space, we (verbs) require >> admin permission, for which we (Mellanox) got customer feedback saying this is >> problematic on some of the environments. > > Well yes it is but the kernel mod is a one line to get rid of this problem. Its one LOC that has behind it many lines of reasoning... e.g as specified in the change-log, those QP are to some extent the RDMA stack form of packet/raw sockets. > > >> Suppose we allow to user to provide source mac+vlan when creating the QP or when modifying its state, and the HW can enforce that -- in that case I think its OK to remove that restriction e.g ala what is allowed today with user space UD QPs when the fabric is IB. > > Well yes that would mean that the source mac and vlan are configured with > admin permissions and then the app would run without within the > constraints established in priviledged moded. There a co-existence between the IP stack and the RDMA stack, which is for example exercised by the RDMA-CM design, here also, the admin configured a MAC and VLAN for a netdevice that is bounded to a HW NIC/port we want to create RAW QP on, and there's a non privileged user space app that want to generate frames with this mac/vlan, and we say its allowed once the HW can enforce that. Or. -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Trust model for raw QPs [not found] ` <502BA406.2060409-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> 2012-08-15 13:40 ` Steve Wise 2012-08-15 14:06 ` Christoph Lameter @ 2012-08-15 16:47 ` Jason Gunthorpe [not found] ` <20120815164701.GD30810-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> 2 siblings, 1 reply; 10+ messages in thread From: Jason Gunthorpe @ 2012-08-15 16:47 UTC (permalink / raw) To: Or Gerlitz Cc: Roland Dreier, Steve Wise, linux-rdma-u79uwXL29TY76Z2rM5mHXA, Christoph Lameter, Tzahi Oved On Wed, Aug 15, 2012 at 04:28:38PM +0300, Or Gerlitz wrote: > Suppose we allow to user to provide source mac+vlan when creating > the QP or when modifying its state, and the HW can enforce that -- > in that case I think its OK to remove that restriction e.g ala what > is allowed today with user space UD QPs when the fabric is IB. This is still not safe, letting userspace inject raw ethernet packets, even with a set smac and vlan tag will still allow it to disrupt TCP communications, send privileged ICMPs, send packets from privileged ports, etc. UD QPs have an enforced SQPN, which AFAIK, is very different from how raw ethernet QPs work. To fix it properly you'd have to make them less 'raw', enforce a certain eth/IPv4/TCP/UDP header stack on rx and tx, for instance. Not sure about receive? What packets do the raw QPs receive? That needs to be pretty narrow too. Can you fix this by elevating the process with SELinux? Jason -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <20120815164701.GD30810-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>]
* Re: Trust model for raw QPs [not found] ` <20120815164701.GD30810-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> @ 2012-08-15 17:31 ` Or Gerlitz [not found] ` <CAJZOPZLiEguZv_HDe51Sg2bqpqVfGh76jNcLn-OfnreMGdmHvQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org> 2012-08-15 17:33 ` Christoph Lameter 1 sibling, 1 reply; 10+ messages in thread From: Or Gerlitz @ 2012-08-15 17:31 UTC (permalink / raw) To: Jason Gunthorpe Cc: Or Gerlitz, Roland Dreier, Steve Wise, linux-rdma-u79uwXL29TY76Z2rM5mHXA, Christoph Lameter, Tzahi Oved, Alex Rosenbaum Jason Gunthorpe <jgunthorpe-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> wrote: > Can you fix this by elevating the process with SELinux? Chirstoph, do you think this would valid option from users standpoint? Or. -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <CAJZOPZLiEguZv_HDe51Sg2bqpqVfGh76jNcLn-OfnreMGdmHvQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>]
* Re: Trust model for raw QPs [not found] ` <CAJZOPZLiEguZv_HDe51Sg2bqpqVfGh76jNcLn-OfnreMGdmHvQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org> @ 2012-08-15 17:36 ` Christoph Lameter 0 siblings, 0 replies; 10+ messages in thread From: Christoph Lameter @ 2012-08-15 17:36 UTC (permalink / raw) To: Or Gerlitz Cc: Jason Gunthorpe, Or Gerlitz, Roland Dreier, Steve Wise, linux-rdma-u79uwXL29TY76Z2rM5mHXA, Tzahi Oved, Alex Rosenbaum On Wed, 15 Aug 2012, Or Gerlitz wrote: > Jason Gunthorpe <jgunthorpe-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> wrote: > > > Can you fix this by elevating the process with SELinux? > > Chirstoph, do you think this would valid option from users standpoint? Sure. If SELinux can be used to compromise systems security (in a controlled fashion) then I think we finally found a reason to use the stuff. Could someone explain how this would work? Hopefully this is easily usable and controllable? -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Trust model for raw QPs [not found] ` <20120815164701.GD30810-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> 2012-08-15 17:31 ` Or Gerlitz @ 2012-08-15 17:33 ` Christoph Lameter [not found] ` <000001392b589827-3d77568e-495d-4463-ab69-05b20205b7f5-000000-p/GC64/jrecnJqMo6gzdpkEOCMrvLtNR@public.gmane.org> 1 sibling, 1 reply; 10+ messages in thread From: Christoph Lameter @ 2012-08-15 17:33 UTC (permalink / raw) To: Jason Gunthorpe Cc: Or Gerlitz, Roland Dreier, Steve Wise, linux-rdma-u79uwXL29TY76Z2rM5mHXA, Tzahi Oved On Wed, 15 Aug 2012, Jason Gunthorpe wrote: > Can you fix this by elevating the process with SELinux? Can SELinux be used to compromise security? How? -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <000001392b589827-3d77568e-495d-4463-ab69-05b20205b7f5-000000-p/GC64/jrecnJqMo6gzdpkEOCMrvLtNR@public.gmane.org>]
* Re: Trust model for raw QPs [not found] ` <000001392b589827-3d77568e-495d-4463-ab69-05b20205b7f5-000000-p/GC64/jrecnJqMo6gzdpkEOCMrvLtNR@public.gmane.org> @ 2012-08-15 18:20 ` Jason Gunthorpe 0 siblings, 0 replies; 10+ messages in thread From: Jason Gunthorpe @ 2012-08-15 18:20 UTC (permalink / raw) To: Christoph Lameter Cc: Or Gerlitz, Roland Dreier, Steve Wise, linux-rdma-u79uwXL29TY76Z2rM5mHXA, Tzahi Oved On Wed, Aug 15, 2012 at 05:33:10PM +0000, Christoph Lameter wrote: > On Wed, 15 Aug 2012, Jason Gunthorpe wrote: > > > Can you fix this by elevating the process with SELinux? > > Can SELinux be used to compromise security? How? Not 100% familiar with SELinux, but they do support ping and other tools which do operate with elevated priviliages, so it must be possible. A how-to document on this subject and a dedicated SELinux capability might be the way to go.. Jason -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2012-08-15 18:20 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-08-15 13:28 Trust model for raw QPs Or Gerlitz
[not found] ` <502BA406.2060409-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>
2012-08-15 13:40 ` Steve Wise
[not found] ` <502BA6CD.9010308-7bPotxP6k4+P2YhJcF5u+vpXobYPEAuW@public.gmane.org>
2012-08-15 13:48 ` Or Gerlitz
2012-08-15 14:06 ` Christoph Lameter
[not found] ` <000001392a9b6b2a-ba67aaa6-b7b8-4c80-90db-03f0172aef6e-000000-p/GC64/jrecnJqMo6gzdpkEOCMrvLtNR@public.gmane.org>
2012-08-15 14:28 ` Or Gerlitz
2012-08-15 16:47 ` Jason Gunthorpe
[not found] ` <20120815164701.GD30810-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2012-08-15 17:31 ` Or Gerlitz
[not found] ` <CAJZOPZLiEguZv_HDe51Sg2bqpqVfGh76jNcLn-OfnreMGdmHvQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2012-08-15 17:36 ` Christoph Lameter
2012-08-15 17:33 ` Christoph Lameter
[not found] ` <000001392b589827-3d77568e-495d-4463-ab69-05b20205b7f5-000000-p/GC64/jrecnJqMo6gzdpkEOCMrvLtNR@public.gmane.org>
2012-08-15 18:20 ` Jason Gunthorpe
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).