* Re: [PATCH v3 bpf-next 00/21] bpf: Sysctl hook [not found] <cover.1554485409.git.rdna@fb.com> @ 2019-04-06 16:43 ` Kees Cook 2019-04-06 17:02 ` Alexei Starovoitov 2019-04-09 20:41 ` Jann Horn 1 sibling, 1 reply; 8+ messages in thread From: Kees Cook @ 2019-04-06 16:43 UTC (permalink / raw) To: Andrey Ignatov Cc: Network Development, Alexei Starovoitov, Daniel Borkmann, Roman Gushchin, kernel-team, Luis Chamberlain, Alexey Dobriyan, LKML, linux-fsdevel@vger.kernel.org, linux-security-module, Jann Horn On Fri, Apr 5, 2019 at 12:36 PM Andrey Ignatov <rdna@fb.com> wrote: > > v2->v3: > - simplify C based selftests by relying on variable offset stack access. > > v1->v2: > - add fs/proc/proc_sysctl.c mainteners to Cc:. > > The patch set introduces new BPF hook for sysctl. > > It adds new program type BPF_PROG_TYPE_CGROUP_SYSCTL and attach type > BPF_CGROUP_SYSCTL. > > BPF_CGROUP_SYSCTL hook is placed before calling to sysctl's proc_handler so > that accesses (read/write) to sysctl can be controlled for specific cgroup > and either allowed or denied, or traced. > > The hook has access to sysctl name, current sysctl value and (on write > only) to new sysctl value via corresponding helpers. New sysctl value can > be overridden by program. Both name and values (current/new) are > represented as strings same way they're visible in /proc/sys/. It is up to > program to parse these strings. > > To help with parsing the most common kind of sysctl value, vector of > integers, two new helpers are provided: bpf_strtol and bpf_strtoul with > semantic similar to user space strtol(3) and strtoul(3). > > The hook also provides bpf_sysctl context with two fields: > * @write indicates whether sysctl is being read (= 0) or written (= 1); > * @file_pos is sysctl file position to read from or write to, can be > overridden. > > The hook allows to make better isolation for containerized applications > that are run as root so that one container can't change a sysctl and affect > all other containers on a host, make changes to allowed sysctl in a safer > way and simplify sysctl tracing for cgroups. This sounds more like an LSM than BPF. So sysctls can get blocked when new BPF is added to a cgroup? Can the BPF be removed (or rather, what's the lifetime of such BPF?) -- Kees Cook ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v3 bpf-next 00/21] bpf: Sysctl hook 2019-04-06 16:43 ` [PATCH v3 bpf-next 00/21] bpf: Sysctl hook Kees Cook @ 2019-04-06 17:02 ` Alexei Starovoitov 2019-04-09 16:50 ` Kees Cook 0 siblings, 1 reply; 8+ messages in thread From: Alexei Starovoitov @ 2019-04-06 17:02 UTC (permalink / raw) To: Kees Cook Cc: Andrey Ignatov, Network Development, Alexei Starovoitov, Daniel Borkmann, Roman Gushchin, kernel-team, Luis Chamberlain, Alexey Dobriyan, LKML, linux-fsdevel@vger.kernel.org, linux-security-module, Jann Horn On Sat, Apr 06, 2019 at 09:43:50AM -0700, Kees Cook wrote: > On Fri, Apr 5, 2019 at 12:36 PM Andrey Ignatov <rdna@fb.com> wrote: > > > > v2->v3: > > - simplify C based selftests by relying on variable offset stack access. > > > > v1->v2: > > - add fs/proc/proc_sysctl.c mainteners to Cc:. > > > > The patch set introduces new BPF hook for sysctl. > > > > It adds new program type BPF_PROG_TYPE_CGROUP_SYSCTL and attach type > > BPF_CGROUP_SYSCTL. > > > > BPF_CGROUP_SYSCTL hook is placed before calling to sysctl's proc_handler so > > that accesses (read/write) to sysctl can be controlled for specific cgroup > > and either allowed or denied, or traced. > > > > The hook has access to sysctl name, current sysctl value and (on write > > only) to new sysctl value via corresponding helpers. New sysctl value can > > be overridden by program. Both name and values (current/new) are > > represented as strings same way they're visible in /proc/sys/. It is up to > > program to parse these strings. > > > > To help with parsing the most common kind of sysctl value, vector of > > integers, two new helpers are provided: bpf_strtol and bpf_strtoul with > > semantic similar to user space strtol(3) and strtoul(3). > > > > The hook also provides bpf_sysctl context with two fields: > > * @write indicates whether sysctl is being read (= 0) or written (= 1); > > * @file_pos is sysctl file position to read from or write to, can be > > overridden. > > > > The hook allows to make better isolation for containerized applications > > that are run as root so that one container can't change a sysctl and affect > > all other containers on a host, make changes to allowed sysctl in a safer > > way and simplify sysctl tracing for cgroups. > > This sounds more like an LSM than BPF. not at all. the key difference is being cgroup scoped. essentially for different containers. > So sysctls can get blocked when > new BPF is added to a cgroup? bpf prog is attached to this hook in a particular cgroup and executed for sysctls for tasks that belong to that cgroup. > Can the BPF be removed (or rather, > what's the lifetime of such BPF?) same as all other cgroup-bpf hooks. Do you have a specific concern or just asking how life time of programs is managed? High level description of lifetime is here: https://facebookmicrosites.github.io/bpf/blog/2018/08/31/object-lifetime.html ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v3 bpf-next 00/21] bpf: Sysctl hook 2019-04-06 17:02 ` Alexei Starovoitov @ 2019-04-09 16:50 ` Kees Cook 2019-04-09 23:17 ` Andrey Ignatov 0 siblings, 1 reply; 8+ messages in thread From: Kees Cook @ 2019-04-09 16:50 UTC (permalink / raw) To: Alexei Starovoitov Cc: Andrey Ignatov, Network Development, Alexei Starovoitov, Daniel Borkmann, Roman Gushchin, kernel-team, Luis Chamberlain, Alexey Dobriyan, LKML, linux-fsdevel@vger.kernel.org, linux-security-module, Jann Horn On Sat, Apr 6, 2019 at 10:03 AM Alexei Starovoitov <alexei.starovoitov@gmail.com> wrote: > > On Sat, Apr 06, 2019 at 09:43:50AM -0700, Kees Cook wrote: > > On Fri, Apr 5, 2019 at 12:36 PM Andrey Ignatov <rdna@fb.com> wrote: > > > BPF_CGROUP_SYSCTL hook is placed before calling to sysctl's proc_handler so > > > that accesses (read/write) to sysctl can be controlled for specific cgroup > > > and either allowed or denied, or traced. > > > > This sounds more like an LSM than BPF. > > not at all. the key difference is being cgroup scoped. > essentially for different containers. Okay, works for me. I was looking at it from the perspective of something providing resource access control policy, which usually falls into the LSM world. > bpf prog is attached to this hook in a particular cgroup > and executed for sysctls for tasks that belong to that cgroup. So it's root limiting root-in-a-container? Nice to have some boundaries there, for sure. > > Can the BPF be removed (or rather, > > what's the lifetime of such BPF?) > > same as all other cgroup-bpf hooks. > Do you have a specific concern or just asking how life time of programs > is managed? > High level description of lifetime is here: > https://facebookmicrosites.github.io/bpf/blog/2018/08/31/object-lifetime.html I'm mostly curious about the access control stacking. i.e. can in-container root add new eBPF to its own cgroup, and if so, can it undo the restrictions already present? (I assume it can't, but figured I'd ask...) -- Kees Cook ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v3 bpf-next 00/21] bpf: Sysctl hook 2019-04-09 16:50 ` Kees Cook @ 2019-04-09 23:17 ` Andrey Ignatov 0 siblings, 0 replies; 8+ messages in thread From: Andrey Ignatov @ 2019-04-09 23:17 UTC (permalink / raw) To: Kees Cook Cc: Alexei Starovoitov, Network Development, Alexei Starovoitov, Daniel Borkmann, Roman Gushchin, Kernel Team, Luis Chamberlain, Alexey Dobriyan, LKML, linux-fsdevel@vger.kernel.org, linux-security-module, Jann Horn Kees Cook <keescook@chromium.org> [Tue, 2019-04-09 09:51 -0700]: > On Sat, Apr 6, 2019 at 10:03 AM Alexei Starovoitov > <alexei.starovoitov@gmail.com> wrote: > > > > On Sat, Apr 06, 2019 at 09:43:50AM -0700, Kees Cook wrote: > > > On Fri, Apr 5, 2019 at 12:36 PM Andrey Ignatov <rdna@fb.com> wrote: > > > Can the BPF be removed (or rather, > > > what's the lifetime of such BPF?) > > > > same as all other cgroup-bpf hooks. > > Do you have a specific concern or just asking how life time of programs > > is managed? > > High level description of lifetime is here: > > https://urldefense.proofpoint.com/v2/url?u=https-3A__facebookmicrosites.github.io_bpf_blog_2018_08_31_object-2Dlifetime.html&d=DwIBaQ&c=5VD0RTtNlTh3ycd41b3MUw&r=3jAokpHyGuCuJ834j-tttQ&m=ZJJ4QMXnksL1b4VPoBM0NJ0i6OWysGc2Om26pcoJpxA&s=6dIZ788hOzoDWVif5XQ-9Mqf9ijko9O7TOWArLzblxU&e= > > I'm mostly curious about the access control stacking. i.e. can > in-container root add new eBPF to its own cgroup, and if so, can it > undo the restrictions already present? (I assume it can't, but figured > I'd ask...) Since I answered similar question from Jann below, I'll answer it here as well (even though it was addressed to Alexei). Stacking can be controlled by attach flags (NONE, BPF_F_ALLOW_OVERRIDE, BPF_F_ALLOW_MULTI) described in include/uapi/linux/bpf.h. Basically if one attaches a program to a cgroup with `bpf_attr.attach_flags = 0` (0 is "NONE"), then nobody can override it by their own programs of same type in any sub-cgroup. It can be hardened further by cgroup namespace so that in-container root doesn't even see part of cgroup hierarchy where cgroup-bpf program is attached to with attach flags NONE. -- Andrey Ignatov ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v3 bpf-next 00/21] bpf: Sysctl hook [not found] <cover.1554485409.git.rdna@fb.com> 2019-04-06 16:43 ` [PATCH v3 bpf-next 00/21] bpf: Sysctl hook Kees Cook @ 2019-04-09 20:41 ` Jann Horn 2019-04-09 23:04 ` Andrey Ignatov 1 sibling, 1 reply; 8+ messages in thread From: Jann Horn @ 2019-04-09 20:41 UTC (permalink / raw) To: Andrey Ignatov Cc: Network Development, Alexei Starovoitov, Daniel Borkmann, guro, kernel-team, Luis Chamberlain, Kees Cook, Alexey Dobriyan, kernel list, linux-fsdevel, linux-security-module On Tue, Apr 9, 2019 at 10:26 PM Andrey Ignatov <rdna@fb.com> wrote: > The patch set introduces new BPF hook for sysctl. > > It adds new program type BPF_PROG_TYPE_CGROUP_SYSCTL and attach type > BPF_CGROUP_SYSCTL. > > BPF_CGROUP_SYSCTL hook is placed before calling to sysctl's proc_handler so > that accesses (read/write) to sysctl can be controlled for specific cgroup > and either allowed or denied, or traced. Don't look at the credentials of "current" in a read or write handler. Consider what happens if, for example, someone inside a cgroup opens a sysctl file and passes the file descriptor to another process outside the cgroup over a unix domain socket, and that other process then writes to it. Either do your access check on open, or use the credentials that were saved during open() in the read/write handler. > The hook has access to sysctl name, current sysctl value and (on write > only) to new sysctl value via corresponding helpers. New sysctl value can > be overridden by program. Both name and values (current/new) are > represented as strings same way they're visible in /proc/sys/. It is up to > program to parse these strings. But even if a filter is installed that prevents all access to a sysctl, you can still read it by installing your own filter that, when a read is attempted the next time, dumps the value into a map or something like that, right? > To help with parsing the most common kind of sysctl value, vector of > integers, two new helpers are provided: bpf_strtol and bpf_strtoul with > semantic similar to user space strtol(3) and strtoul(3). > > The hook also provides bpf_sysctl context with two fields: > * @write indicates whether sysctl is being read (= 0) or written (= 1); > * @file_pos is sysctl file position to read from or write to, can be > overridden. > > The hook allows to make better isolation for containerized applications > that are run as root so that one container can't change a sysctl and affect > all other containers on a host, make changes to allowed sysctl in a safer > way and simplify sysctl tracing for cgroups. Why can't you use a user namespace and isolate things properly that way? That would be much cleaner, wouldn't it? ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v3 bpf-next 00/21] bpf: Sysctl hook 2019-04-09 20:41 ` Jann Horn @ 2019-04-09 23:04 ` Andrey Ignatov 2019-04-09 23:22 ` Jann Horn 0 siblings, 1 reply; 8+ messages in thread From: Andrey Ignatov @ 2019-04-09 23:04 UTC (permalink / raw) To: Jann Horn Cc: Network Development, Alexei Starovoitov, Daniel Borkmann, Roman Gushchin, Kernel Team, Luis Chamberlain, Kees Cook, Alexey Dobriyan, kernel list, linux-fsdevel, linux-security-module Jann Horn <jannh@google.com> [Tue, 2019-04-09 13:42 -0700]: > On Tue, Apr 9, 2019 at 10:26 PM Andrey Ignatov <rdna@fb.com> wrote: > > The patch set introduces new BPF hook for sysctl. > > > > It adds new program type BPF_PROG_TYPE_CGROUP_SYSCTL and attach type > > BPF_CGROUP_SYSCTL. > > > > BPF_CGROUP_SYSCTL hook is placed before calling to sysctl's proc_handler so > > that accesses (read/write) to sysctl can be controlled for specific cgroup > > and either allowed or denied, or traced. > > Don't look at the credentials of "current" in a read or write handler. > Consider what happens if, for example, someone inside a cgroup opens a > sysctl file and passes the file descriptor to another process outside > the cgroup over a unix domain socket, and that other process then > writes to it. Either do your access check on open, or use the > credentials that were saved during open() in the read/write handler. This way this someone inside cgroup should already have control over something running as root [1] outside of this cgroup, i.e. the game is already lost, even without this hook. [1] Since proc_sys_read() / proc_sys_write() check sysctl_perm() before execution reaches the hook. This patch set doesn't look at credentials at all and relies on what checks were already done at sys_open time or in proc_sys_call_handler() before execution reaches the hook. > > The hook has access to sysctl name, current sysctl value and (on write > > only) to new sysctl value via corresponding helpers. New sysctl value can > > be overridden by program. Both name and values (current/new) are > > represented as strings same way they're visible in /proc/sys/. It is up to > > program to parse these strings. > > But even if a filter is installed that prevents all access to a > sysctl, you can still read it by installing your own filter that, when > a read is attempted the next time, dumps the value into a map or > something like that, right? No. This can be controlled by cgroup hierarchy and appropriate attach flags, same way as with any other cgroup-bpf hook. E.g. imagine there is a cgroup hierarchy: root/slice/container/ and container application runs in root/slice/container/ in a cgroup namespace (CLONE_NEWCGROUP) that makes visible only "container/" part of the hierarchy, i.e. from inside container application can't even see "root/slice/". Administrator can then attach sysctl hook to "root/slice/" with attach flag NONE (bpf_attr.attach_flags = 0) what means nobody down the hierarchy can override the program attached by administrator. > > To help with parsing the most common kind of sysctl value, vector of > > integers, two new helpers are provided: bpf_strtol and bpf_strtoul with > > semantic similar to user space strtol(3) and strtoul(3). > > > > The hook also provides bpf_sysctl context with two fields: > > * @write indicates whether sysctl is being read (= 0) or written (= 1); > > * @file_pos is sysctl file position to read from or write to, can be > > overridden. > > > > The hook allows to make better isolation for containerized applications > > that are run as root so that one container can't change a sysctl and affect > > all other containers on a host, make changes to allowed sysctl in a safer > > way and simplify sysctl tracing for cgroups. > > Why can't you use a user namespace and isolate things properly that > way? That would be much cleaner, wouldn't it? I'm not sure I understand how user namespace helps here. From my understanding it can only completely deny access to sysctl and can't do fine-grained control for specific sysctl knobs. It also can't make allow/deny decision based on sysctl value being written. Basically user namespace is all or nothing. This sysctl hook provides a way to implement fine-grained access control for sysctl knobs based on sysctl name or value being written or whatever else policy administrator can come up with. -- Andrey Ignatov ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v3 bpf-next 00/21] bpf: Sysctl hook 2019-04-09 23:04 ` Andrey Ignatov @ 2019-04-09 23:22 ` Jann Horn 2019-04-09 23:34 ` Alexei Starovoitov 0 siblings, 1 reply; 8+ messages in thread From: Jann Horn @ 2019-04-09 23:22 UTC (permalink / raw) To: Andrey Ignatov Cc: Network Development, Alexei Starovoitov, Daniel Borkmann, Roman Gushchin, Kernel Team, Luis Chamberlain, Kees Cook, Alexey Dobriyan, kernel list, linux-fsdevel, linux-security-module On Wed, Apr 10, 2019 at 1:04 AM Andrey Ignatov <rdna@fb.com> wrote: > Jann Horn <jannh@google.com> [Tue, 2019-04-09 13:42 -0700]: > > On Tue, Apr 9, 2019 at 10:26 PM Andrey Ignatov <rdna@fb.com> wrote: > > > The patch set introduces new BPF hook for sysctl. > > > > > > It adds new program type BPF_PROG_TYPE_CGROUP_SYSCTL and attach type > > > BPF_CGROUP_SYSCTL. > > > > > > BPF_CGROUP_SYSCTL hook is placed before calling to sysctl's proc_handler so > > > that accesses (read/write) to sysctl can be controlled for specific cgroup > > > and either allowed or denied, or traced. > > > > Don't look at the credentials of "current" in a read or write handler. > > Consider what happens if, for example, someone inside a cgroup opens a > > sysctl file and passes the file descriptor to another process outside > > the cgroup over a unix domain socket, and that other process then > > writes to it. Either do your access check on open, or use the > > credentials that were saved during open() in the read/write handler. > > This way this someone inside cgroup should already have control over > something running as root [1] outside of this cgroup, i.e. the game is > already lost, even without this hook. > > [1] Since proc_sys_read() / proc_sys_write() check sysctl_perm() before > execution reaches the hook. You don't need to have _control_ over something running as root. You only need to be able to communicate with something that expects to be passed in file descriptors for some purpose. > This patch set doesn't look at credentials at all and relies on what > checks were already done at sys_open time or in proc_sys_call_handler() > before execution reaches the hook. You're looking at the cgroup though. > > > The hook has access to sysctl name, current sysctl value and (on write > > > only) to new sysctl value via corresponding helpers. New sysctl value can > > > be overridden by program. Both name and values (current/new) are > > > represented as strings same way they're visible in /proc/sys/. It is up to > > > program to parse these strings. > > > > But even if a filter is installed that prevents all access to a > > sysctl, you can still read it by installing your own filter that, when > > a read is attempted the next time, dumps the value into a map or > > something like that, right? > > No. This can be controlled by cgroup hierarchy and appropriate attach > flags, same way as with any other cgroup-bpf hook. > > E.g. imagine there is a cgroup hierarchy: > root/slice/container/ > > and container application runs in root/slice/container/ in a cgroup > namespace (CLONE_NEWCGROUP) that makes visible only "container/" part of > the hierarchy, i.e. from inside container application can't even see > "root/slice/". > > Administrator can then attach sysctl hook to "root/slice/" with attach > flag NONE (bpf_attr.attach_flags = 0) what means nobody down the > hierarchy can override the program attached by administrator. Ah, okay. > > > To help with parsing the most common kind of sysctl value, vector of > > > integers, two new helpers are provided: bpf_strtol and bpf_strtoul with > > > semantic similar to user space strtol(3) and strtoul(3). > > > > > > The hook also provides bpf_sysctl context with two fields: > > > * @write indicates whether sysctl is being read (= 0) or written (= 1); > > > * @file_pos is sysctl file position to read from or write to, can be > > > overridden. > > > > > > The hook allows to make better isolation for containerized applications > > > that are run as root so that one container can't change a sysctl and affect > > > all other containers on a host, make changes to allowed sysctl in a safer > > > way and simplify sysctl tracing for cgroups. > > > > Why can't you use a user namespace and isolate things properly that > > way? That would be much cleaner, wouldn't it? > > I'm not sure I understand how user namespace helps here. From my > understanding it can only completely deny access to sysctl and can't do > fine-grained control for specific sysctl knobs. It also can't make > allow/deny decision based on sysctl value being written. > > Basically user namespace is all or nothing. This sysctl hook provides a > way to implement fine-grained access control for sysctl knobs based on > sysctl name or value being written or whatever else policy administrator > can come up with. But there's a reason why user namespaces are all-or-nothing on these things. If the kernel does not explicitly make a sysctl available to a container, the sysctl has global effects, and therefore probably shouldn't be exposed to anything other than someone with administrative privileges across the whole system. If the kernel does make it available to a container, the sysctl's effects are limited to the container (or otherwise it's a kernel bug). Can you give examples of sysctls that you want to permit using from containers, that wouldn't be accessible in a user namespace? ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v3 bpf-next 00/21] bpf: Sysctl hook 2019-04-09 23:22 ` Jann Horn @ 2019-04-09 23:34 ` Alexei Starovoitov 0 siblings, 0 replies; 8+ messages in thread From: Alexei Starovoitov @ 2019-04-09 23:34 UTC (permalink / raw) To: Jann Horn Cc: Andrey Ignatov, Network Development, Alexei Starovoitov, Daniel Borkmann, Roman Gushchin, Kernel Team, Luis Chamberlain, Kees Cook, Alexey Dobriyan, kernel list, linux-fsdevel, linux-security-module On Tue, Apr 9, 2019 at 4:22 PM Jann Horn <jannh@google.com> wrote: > > But there's a reason why user namespaces are all-or-nothing on these > things. If the kernel does not explicitly make a sysctl available to a > container, the sysctl has global effects, and therefore probably > shouldn't be exposed to anything other than someone with > administrative privileges across the whole system. If the kernel does > make it available to a container, the sysctl's effects are limited to > the container (or otherwise it's a kernel bug). > > Can you give examples of sysctls that you want to permit using from > containers, that wouldn't be accessible in a user namespace? I think this discussion has started with incorrect assumptions about the goal of the patch set. There is no _security_ part here. The sysctl hook is to prevent silly things to be done by chef and apps. Most interesting sysctls need root anyway. The root can detach all progs and do its thing. Consider tcp_mem sysctl. We've seen it's been misconfigured and caused performance issues. bpf prog can track what is being written, alarm, etc. User namespaces are not applicable here. ^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2019-04-09 23:35 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <cover.1554485409.git.rdna@fb.com>
2019-04-06 16:43 ` [PATCH v3 bpf-next 00/21] bpf: Sysctl hook Kees Cook
2019-04-06 17:02 ` Alexei Starovoitov
2019-04-09 16:50 ` Kees Cook
2019-04-09 23:17 ` Andrey Ignatov
2019-04-09 20:41 ` Jann Horn
2019-04-09 23:04 ` Andrey Ignatov
2019-04-09 23:22 ` Jann Horn
2019-04-09 23:34 ` Alexei Starovoitov
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).