public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Vivek Goyal <vgoyal@redhat.com>
To: Simo Sorce <ssorce@redhat.com>
Cc: Andy Lutomirski <luto@amacapital.net>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	cgroups@vger.kernel.org,
	Network Development <netdev@vger.kernel.org>,
	"David S. Miller" <davem@davemloft.net>,
	Tejun Heo <tj@kernel.org>,
	jkaluza@redhat.com, lpoetter@redhat.com, kay@redhat.com
Subject: Re: [PATCH 2/2] net: Implement SO_PEERCGROUP
Date: Thu, 13 Mar 2014 11:00:34 -0400	[thread overview]
Message-ID: <20140313150034.GG18914@redhat.com> (raw)
In-Reply-To: <1394722534.32465.227.camel@willson.li.ssimo.org>

On Thu, Mar 13, 2014 at 10:55:34AM -0400, Simo Sorce wrote:

[..]
> > > This might not be quite as awful as I thought.  At least you're
> > > looking up the cgroup at connection time instead of at send time.
> > > 
> > > OTOH, this is still racy -- the socket could easily outlive the cgroup
> > > that created it.
> > 
> > That's a good point. What guarantees that previous cgroup was not
> > reassigned to a different container.
> > 
> > What if a process A opens the connection with sssd. Process A passes the
> > file descriptor to a different process B in a differnt container.
> 
> Stop right here.
> If the process passes the fd it is not my problem anymore.
> The process can as well just 'proxy' all the information to another
> process.
> 
> We just care to properly identify the 'original' container, we are not
> in the business of detecting malicious behavior. That's something other
> mechanism need to protect against (SELinux or other LSMs, normal
> permissions, capabilities, etc...).
> 
> > Process A exits. Container gets removed from system and new one gets
> > launched which uses same cgroup as old one. Now process B sends a new
> > request and SSSD will serve it based on policy of newly launched
> > container.
> > 
> > This sounds very similar to pid race where socket/connection will outlive
> > the pid.
> 
> Nope, completely different.
> 

I think you missed my point. Passing file descriptor is not the problem.
Problem is reuse of same cgroup name for a different container while
socket lives on. And it is same race as reuse of a pid for a different
process.

Thanks
Vivek

  reply	other threads:[~2014-03-13 15:00 UTC|newest]

Thread overview: 41+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-03-12 20:46 [PATCH 0/2][V2] net: Implement SO_PEERCGROUP to get cgroup of peer Vivek Goyal
2014-03-12 20:46 ` [PATCH 1/2] cgroup: Provide empty definition of task_cgroup_path() Vivek Goyal
2014-03-12 20:46 ` [PATCH 2/2] net: Implement SO_PEERCGROUP Vivek Goyal
2014-03-12 20:58   ` Cong Wang
2014-03-13 13:48     ` Vivek Goyal
2014-03-12 21:00   ` Andy Lutomirski
2014-03-12 21:12     ` Andy Lutomirski
2014-03-12 21:16       ` Simo Sorce
2014-03-12 21:19         ` Andy Lutomirski
2014-03-13  1:17           ` Simo Sorce
2014-03-13  1:21             ` Andy Lutomirski
2014-03-13  1:43               ` Simo Sorce
2014-03-13  2:12                 ` Andy Lutomirski
2014-03-13 14:27                   ` Vivek Goyal
2014-03-14 23:54                     ` Eric W. Biederman
2014-03-13 17:51                   ` Simo Sorce
2014-03-13 17:55                     ` Andy Lutomirski
2014-03-13 17:57                       ` Simo Sorce
2014-03-13 18:03                         ` Andy Lutomirski
2014-03-13 17:58                       ` Simo Sorce
2014-03-13 18:01                         ` Andy Lutomirski
2014-03-13 18:05                         ` Tim Hockin
2014-03-13 19:53                       ` Vivek Goyal
2014-03-13 19:58                         ` Andy Lutomirski
2014-03-13 20:06                           ` Vivek Goyal
2014-03-13 20:17                             ` Vivek Goyal
2014-03-13 20:19                               ` Vivek Goyal
2014-03-13 21:21                             ` Andy Lutomirski
2014-03-14 23:49                             ` Eric W. Biederman
2014-03-13 18:02                     ` Vivek Goyal
2014-03-13 14:14       ` Vivek Goyal
2014-03-13 14:55         ` Simo Sorce
2014-03-13 15:00           ` Vivek Goyal [this message]
2014-03-13 16:33             ` Simo Sorce
2014-03-13 17:25               ` Andy Lutomirski
2014-03-13 17:55                 ` Simo Sorce
2014-03-13 17:56                 ` Tim Hockin
2014-03-12 20:56 ` [PATCH 0/2][V2] net: Implement SO_PEERCGROUP to get cgroup of peer Andy Lutomirski
2014-03-12 20:59   ` Simo Sorce
2014-03-12 21:09     ` Andy Lutomirski
  -- strict thread matches above, loose matches on Subject: below --
2014-03-12 18:45 [PATCH 0/2] " Vivek Goyal
2014-03-12 18:45 ` [PATCH 2/2] net: Implement SO_PEERCGROUP Vivek Goyal

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20140313150034.GG18914@redhat.com \
    --to=vgoyal@redhat.com \
    --cc=cgroups@vger.kernel.org \
    --cc=davem@davemloft.net \
    --cc=jkaluza@redhat.com \
    --cc=kay@redhat.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lpoetter@redhat.com \
    --cc=luto@amacapital.net \
    --cc=netdev@vger.kernel.org \
    --cc=ssorce@redhat.com \
    --cc=tj@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox