public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Mimi Zohar <zohar@linux.vnet.ibm.com>
To: Tycho Andersen <tycho@docker.com>,
	Stefan Berger <stefanb@linux.vnet.ibm.com>
Cc: James Bottomley <James.Bottomley@HansenPartnership.com>,
	containers@lists.linux-foundation.org,
	LKML <linux-kernel@vger.kernel.org>,
	xiaolong.ye@intel.com,
	"Eric W. Biederman" <ebiederm@xmission.com>,
	lkp@01.org
Subject: Re: [PATCH v4] Introduce v3 namespaced file capabilities
Date: Tue, 13 Jun 2017 16:59:30 -0400	[thread overview]
Message-ID: <1497387570.21594.427.camel@linux.vnet.ibm.com> (raw)
In-Reply-To: <20170613205312.gre2s6a3zsrjnyos@smitten>

On Tue, 2017-06-13 at 14:53 -0600, Tycho Andersen wrote:
> On Tue, Jun 13, 2017 at 04:49:03PM -0400, Stefan Berger wrote:
> > On 06/13/2017 04:46 PM, Tycho Andersen wrote:
> > > On Tue, Jun 13, 2017 at 10:45:02AM -0700, James Bottomley wrote:
> > > > On Tue, 2017-06-13 at 11:14 -0600, Tycho Andersen via Containers wrote:
> > > > > Hi Stefan,
> > > > > 
> > > > > On Tue, Jun 13, 2017 at 11:47:26AM -0400, Stefan Berger wrote:
> > > > > > On 05/08/2017 02:11 PM, Serge E. Hallyn wrote:
> > > > > > > Root in a non-initial user ns cannot be trusted to write a
> > > > > > > traditional security.capability xattr.  If it were allowed to do
> > > > > > > so, then any unprivileged user on the host could map his own uid
> > > > > > > to root in a private namespace, write the xattr, and execute the
> > > > > > > file with privilege on the host.
> > > > > > > 
> > > > > > > However supporting file capabilities in a user namespace is very
> > > > > > > desirable.  Not doing so means that any programs designed to run
> > > > > > > with limited privilege must continue to support other methods of
> > > > > > > gaining and dropping privilege.  For instance a program installer
> > > > > > > must detect whether file capabilities can be assigned, and assign
> > > > > > > them if so but set setuid-root otherwise.  The program in turn
> > > > > > > must know how to drop partial capabilities, and do so only if
> > > > > > > setuid-root.
> > > > > > Hi Serge,
> > > > > > 
> > > > > > 
> > > > > >    I have been looking at patch below primarily to learn how we
> > > > > > could apply a similar technique to security.ima and security.evm
> > > > > > for a namespaced IMA. From the paragraphs above I thought that you
> > > > > > solved the problem of a shared filesystem where one now can write
> > > > > > different security.capability xattrs by effectively supporting for
> > > > > > example security.capability[uid=1000] and
> > > > > > security.capability[uid=2000] written into the filesystem. Each
> > > > > > would then become visible as security.capability if the userns
> > > > > > mapping is set appropriately.
> > > > > One disadvantage of this approach is that whoever is setting up the
> > > > > container would need to go touch the security.ima attribute for each
> > > > > file in the contianer, which would slow down container creation time.
> > > > > For capabilities this makes sense, because you might want the file to
> > > > > have different capabilities in different namespaces, but for IMA,
> > > > > since the file hash will be the same in every namespace,
> > > > Actually, this isn't necessarily true: IMA may have the hash, you're
> > > > right, but I suspect in most container use cases it will have the
> > > > signature.  It's definitely a use case that the container will be using
> > > > a different keyring from the host, so different signatures are surely
> > > > possible for the same underlying image file.
> > > > 
> > > > One might imagine doing the above via overlays, because the new
> > > > signature should override the old.
> > > Yes, good point, thanks. Assuming the container and the host are using
> > > the same keyring, we could design it in such a way that the container
> > > engine doesn't need to touch every file on creation, which would be
> > > very nice.
> > 
> > I don't think this will be the general case. The host may be Ubuntu, the
> > guest could be Fedora and you'll have different keys. I don't think you
> > would want the container keys on the host keyring.
> 
> I guess it depends: if your entire infrastructure needs to be signed
> by your ops team, it would (presumably) all be the same ops key. If
> you're running off the shelf stuff from the distros or from a vendor,
> probably not, I agree.

Assuming you want to support container specific executables, you would
want them specifically signed by a key not on the system IMA keyring.

Mimi

  parent reply	other threads:[~2017-06-13 20:59 UTC|newest]

Thread overview: 39+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-05-07  9:21 64fa03de33: BUG:Dentry_still_in_use kernel test robot
2017-05-08  4:44 ` Serge E. Hallyn
2017-05-08 11:47   ` Masami Ichikawa
2017-05-08 15:49     ` Serge E. Hallyn
2017-05-08 18:11     ` [PATCH v4] Introduce v3 namespaced file capabilities Serge E. Hallyn
2017-05-09 16:55       ` Eric W. Biederman
2017-05-09 20:37         ` Serge E. Hallyn
2017-05-09 22:27           ` Eric W. Biederman
2017-06-13 15:47       ` Stefan Berger
2017-06-13 17:14         ` Tycho Andersen
2017-06-13 17:42           ` Stefan Berger
2017-06-13 20:51             ` Tycho Andersen
2017-06-13 17:45           ` James Bottomley
2017-06-13 20:46             ` Tycho Andersen
2017-06-13 20:49               ` Stefan Berger
2017-06-13 20:53                 ` Tycho Andersen
2017-06-13 20:58                   ` Stefan Berger
2017-06-13 20:59                   ` Mimi Zohar [this message]
2017-06-13 21:09                     ` Tycho Andersen
2017-06-13 17:18         ` Serge E. Hallyn
2017-06-13 18:12           ` Stefan Berger
2017-06-13 23:55             ` Serge E. Hallyn
2017-06-14 12:27               ` Stefan Berger
2017-06-15  3:05                 ` Serge E. Hallyn
2017-06-16  9:02                   ` Christian Brauner
2017-06-16 22:24                   ` Stefan Berger
2017-06-17 20:56                   ` Stefan Berger
2017-06-18 22:14                     ` Serge E. Hallyn
2017-06-19  1:13                       ` Stefan Berger
2017-06-19 13:05                         ` Stefan Berger
2017-06-20  6:23                         ` Serge E. Hallyn
2017-06-19 21:34                       ` Eric W. Biederman
2017-06-20  5:42                         ` Amir Goldstein
2017-06-20 12:19                           ` Stefan Berger
2017-06-20 17:33                             ` Stefan Berger
2017-06-20 19:56                               ` Amir Goldstein
2017-06-20 19:57                           ` Vivek Goyal
2017-06-13 23:42         ` Serge E. Hallyn
2017-06-13 23:50           ` Serge E. Hallyn

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1497387570.21594.427.camel@linux.vnet.ibm.com \
    --to=zohar@linux.vnet.ibm.com \
    --cc=James.Bottomley@HansenPartnership.com \
    --cc=containers@lists.linux-foundation.org \
    --cc=ebiederm@xmission.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lkp@01.org \
    --cc=stefanb@linux.vnet.ibm.com \
    --cc=tycho@docker.com \
    --cc=xiaolong.ye@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox