From: "Günther Noack" <gnoack@google.com>
To: "Mickaël Salaün" <mic@digikod.net>
Cc: "Günther Noack" <gnoack3000@gmail.com>,
linux-security-module@vger.kernel.org,
"Paul Moore" <paul@paul-moore.com>,
"Konstantin Meskhidze" <konstantin.meskhidze@huawei.com>
Subject: Re: [RFC 2/4] landlock: Add LANDLOCK_ACCESS_FS_IOCTL access right
Date: Fri, 14 Jul 2023 14:46:09 +0200 [thread overview]
Message-ID: <ZLFDkbyaEBe0fc6e@google.com> (raw)
In-Reply-To: <09c6939f-c9e4-d1ed-bef1-3b1f05f81522@digikod.net>
Hi!
On Mon, Jun 19, 2023 at 04:42:07PM +0200, Mickaël Salaün wrote:
> I'd like a new documentation paragraph explaining the limitation of
> LANDLOCK_ACCESS_FS_IOCTL (not fine-grained; should be careful about
> fscrypt-like features for regular files; compatibility with TTY and other
> common IOCTLs), a way to get more guarantees (e.g. using nodev mount points
> when possible), and a sentence explaining that future work will enable a
> more fine-grained access control.
I tried to add this comment but realized that I don't understand it well enough -
Regarding fscrypt:
If a process is not the fscrypt user space tool itself, in which ways do the
fscrypt ioctls matter for that process?
I dug up a list of ioctls in tools/include/uapi/linux/fscrypt.h which look
related, but these look like they are only needed for the set up of encrypted
files and directories, but not for using these files later from other
processes?
Am I misunderstanding that?
The one thing that seems to stand out with the fscrypt ioctls is that the same
ioctl numbers are implemented by multiple different file systems.
Regarding nodev mount points:
I guess this is not relevant any more if we split the IOCTL right into a
device-only and non-device-only flag?
(I prefer that solution over nodev mounts as well, because that solution works
unprivileged from the perspective of the process that defines the Landlock
policy. Re-mounting with different options requires more rights and can often
not be influenced by small utilities.)
Thanks,
—Günther
--
Sent using Mutt 🐕 Woof Woof
next prev parent reply other threads:[~2023-07-14 12:46 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-05-02 17:17 [RFC 0/4] Landlock: ioctl support Günther Noack
2023-05-02 17:17 ` [RFC 1/4] landlock: Increment Landlock ABI version to 4 Günther Noack
2023-06-19 14:41 ` Mickaël Salaün
2023-05-02 17:17 ` [RFC 2/4] landlock: Add LANDLOCK_ACCESS_FS_IOCTL access right Günther Noack
2023-06-19 14:42 ` Mickaël Salaün
2023-07-14 12:46 ` Günther Noack [this message]
2023-07-31 13:42 ` Mickaël Salaün
2023-05-02 17:17 ` [RFC 3/4] selftests/landlock: Test ioctl support Günther Noack
2023-06-19 14:42 ` Mickaël Salaün
2023-08-07 7:39 ` Günther Noack
2023-08-07 9:41 ` Mickaël Salaün
2023-08-07 13:21 ` Günther Noack
2023-05-02 17:17 ` [RFC 4/4] samples/landlock: Add support for LANDLOCK_ACCESS_FS_IOCTL Günther Noack
2023-05-04 21:12 ` [RFC 0/4] Landlock: ioctl support Mickaël Salaün
2023-05-10 19:21 ` Günther Noack
2023-05-24 21:43 ` Jeff Xu
2023-06-17 9:48 ` Mickaël Salaün
2023-06-20 23:44 ` Jeff Xu
2023-06-21 9:17 ` Mickaël Salaün
2023-06-17 9:47 ` Mickaël Salaün
2023-06-19 16:21 ` Günther Noack
2023-06-19 18:57 ` Mickaël Salaün
2023-07-12 11:08 ` Günther Noack
2023-07-12 11:38 ` Mickaël Salaün
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ZLFDkbyaEBe0fc6e@google.com \
--to=gnoack@google.com \
--cc=gnoack3000@gmail.com \
--cc=konstantin.meskhidze@huawei.com \
--cc=linux-security-module@vger.kernel.org \
--cc=mic@digikod.net \
--cc=paul@paul-moore.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).