linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Vivek Goyal <vgoyal@redhat.com>
To: Andy Lutomirski <luto@amacapital.net>
Cc: Simo Sorce <ssorce@redhat.com>,
	Daniel J Walsh <dwalsh@redhat.com>,
	David Miller <davem@davemloft.net>, Tejun Heo <tj@kernel.org>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	lpoetter@redhat.com, cgroups@vger.kernel.org, kay@redhat.com,
	Network Development <netdev@vger.kernel.org>
Subject: Re: [PATCH 2/2] net: Implement SO_PASSCGROUP to enable passing cgroup path
Date: Thu, 17 Apr 2014 12:38:27 -0400	[thread overview]
Message-ID: <20140417163827.GA25334@redhat.com> (raw)
In-Reply-To: <CALCETrUrj2LtAoXp600BD2ANgE2UUEbTYQrK8hHqDR=qpeFPcg@mail.gmail.com>

On Thu, Apr 17, 2014 at 09:11:11AM -0700, Andy Lutomirski wrote:
> On Thu, Apr 17, 2014 at 9:04 AM, Simo Sorce <ssorce@redhat.com> wrote:
> > On Thu, 2014-04-17 at 08:41 -0700, Daniel J Walsh wrote:
> >> On 04/16/2014 11:59 AM, Vivek Goyal wrote:
> >> > On Wed, Apr 16, 2014 at 11:13:31AM -0700, Andy Lutomirski wrote:
> >> >> On Wed, Apr 16, 2014 at 11:06 AM, Vivek Goyal <vgoyal@redhat.com> wrote:
> >> >>> On Wed, Apr 16, 2014 at 09:31:25AM -0700, Andy Lutomirski wrote:
> >> >>> I am not sure how same issue with happen with cgroups. In the case of
> >> >>> socket example, you are forcing a setuid program to write to standard
> >> >>> output and that setuid program will run in same cgroup as caller and
> >> >>> will have same cgroup as caller. So even if somebody was using cgroup
> >> >>> information for authentication, atleast in this particular case it
> >> >>> will not be a problem. Both unpriviliged and priviliged programs has
> >> >>> same cgroups.
> >> >>>
> >> >> I'm not sure that there's an actual attackable program.  But I also
> >> >> see no reason to be convinced that there isn't one, and the problem
> >> >> can easily be avoided by requiring programs to explicitly ask to send
> >> >> their cgroup.
> >> > If you can't prove that there is something fundamentally wrong with
> >> > passing cgroup info to receiver, there is no reason to block these
> >> > patches either.
> >> >
> >> > We can't fix the problems which we can't see. You are saying that I
> >> > don't know what kind of problem can happen due to cgroup passing. Still
> >> > that does not mean none of the problems exist. So let us not pass cgroup
> >> > info by default and ask client to opt in.
> >> >
> >> > I don't think this is a very convincing argument.
> >> >
> >> > To me, if we can't see anything fundamentally wrong with passing cgroup
> >> > info, we should take these patches in. And once we figure out that there
> >> > is are problematic use cases, then implement SO_NOPASSCGROUP and
> >> > SO_NOPEERCRED  and allow problematic clients to opt out.
> >> >
> >> > Thanks
> >> > Vivek
> >> The two use cases for this patch are:
> >
> > Let me add some caveats to explain what is used, as the 2 cases map to
> > the 2 different new options.
> >
> >> 1 Logging, to make sure the cgroup information gets correctly attributed
> >> to the caller.
> >
> > In here the logging system wants to know *who* logged, if the cgroups of
> > the process actually doing the logging changes, that's what the logging
> > system wants to know.
> > If somehow a setuid binary can change the cgroups, then the logging
> > system *wants* to know that these logs are coming from there, because
> > they sure are not coming from the original bounded process anymore.
> >
> > This use case wants to use SO_PASSCGROUP as it wants to know who the
> > current writer is, not who opened the file descriptor.
> 
> No.  The logging daemon thinks it wants to know who the writer is, but
> the logging daemon is wrong.  It actually wants to know who composed a
> log message destined to it.  The caller of write(2) may or may not be
> the same entity.

So say, a process A writes a message, passes that message to process B and
asks process B to send the message to logger daemon. You think logger
deamon is interested in knowing who originally wrote the message (process A)
instead of who sent the message(process B)? I think this is wrong.

Logger daemon is interested in logging who actually *sent* the message
and does not care who originally *wrote* the message.

> 
> If this form of SO_PASSCGROUP somehow makes it into a pull request for
> Linus, I will ask him not to pull it and/or to revert it.  I think
> he'll agree that write(2) MUST NOT care who called it.  Yes, I don't
> see how this is exploitable on my machine, but it's a mistake for the
> same reason that the netlink crap in CVE-2014-0181 is a mistake.

There is no issue with usage of SO_PASSCGROUP information with logger
example. You are assuming that people are going to use SO_PASSCGROUP
for security related stuff.

So to me, argument should be made with systemd or any other application
if they try to use it for any unsafe purposes. Logger is a very valid
use case and for that purpose SO_PASSCGROUP patchset should be go in.

Thanks
Vivek

  parent reply	other threads:[~2014-04-17 16:38 UTC|newest]

Thread overview: 91+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-04-15 21:15 [PATCH 0/2] net: Implement SO_PEERCGROUP and SO_PASSCGROUP socket options Vivek Goyal
2014-04-15 21:15 ` [PATCH 1/2] net: Implement SO_PEERCGROUP Vivek Goyal
2014-04-15 21:54   ` Andy Lutomirski
2014-04-16  0:22     ` Vivek Goyal
2014-04-15 21:15 ` [PATCH 2/2] net: Implement SO_PASSCGROUP to enable passing cgroup path Vivek Goyal
2014-04-15 21:53   ` Andy Lutomirski
2014-04-15 23:09     ` Simo Sorce
2014-04-16  0:20     ` Vivek Goyal
2014-04-16  1:05       ` David Miller
2014-04-16  3:47       ` Andy Lutomirski
2014-04-16 10:17         ` Vivek Goyal
2014-04-16 14:34           ` Andy Lutomirski
2014-04-16 15:10             ` Vivek Goyal
2014-04-16 12:57         ` David Miller
2014-04-16 14:37           ` Andy Lutomirski
2014-04-16 16:13             ` Simo Sorce
2014-04-16 16:21               ` Tejun Heo
2014-04-16 16:54                 ` Simo Sorce
2014-04-16 16:31               ` Andy Lutomirski
2014-04-16 17:02                 ` Simo Sorce
2014-04-16 17:29                   ` Andy Lutomirski
2014-04-16 17:34                     ` Simo Sorce
2014-04-16 17:53                       ` Andy Lutomirski
2014-04-16 18:36                     ` Vivek Goyal
2014-04-16 18:40                       ` Andy Lutomirski
2014-04-16 18:51                         ` Vivek Goyal
2014-04-16 18:59                           ` Andy Lutomirski
2014-04-16 18:06                 ` Vivek Goyal
2014-04-16 18:13                   ` Andy Lutomirski
2014-04-16 18:25                     ` Vivek Goyal
2014-04-16 18:35                       ` Andy Lutomirski
2014-04-16 19:06                         ` Vivek Goyal
2014-04-16 19:13                           ` Andy Lutomirski
2014-04-16 19:39                             ` Vivek Goyal
2014-04-16 20:24                               ` Andy Lutomirski
2014-04-17 13:41                                 ` Vivek Goyal
2014-04-16 18:59                     ` Vivek Goyal
2014-04-17 15:41                       ` Daniel J Walsh
2014-04-17 16:04                         ` Simo Sorce
2014-04-17 16:11                           ` Andy Lutomirski
2014-04-17 16:24                             ` Simo Sorce
2014-04-17 16:37                               ` Andy Lutomirski
2014-04-17 16:48                                 ` Simo Sorce
2014-04-17 16:55                                   ` Andy Lutomirski
2014-04-17 17:12                                     ` Vivek Goyal
2014-04-17 17:26                                       ` Andy Lutomirski
2014-04-17 17:33                                         ` Simo Sorce
2014-04-17 17:35                                           ` Andy Lutomirski
2014-04-17 17:47                                             ` Simo Sorce
2014-04-17 18:05                                               ` Andy Lutomirski
2014-04-17 18:23                                             ` Simo Sorce
2014-04-17 18:33                                               ` Andy Lutomirski
2014-04-17 18:50                                               ` Vivek Goyal
2014-04-17 18:57                                                 ` Vivek Goyal
2014-04-17 19:06                                                   ` Andy Lutomirski
2014-04-17 19:15                                                     ` Simo Sorce
2014-04-17 19:19                                                       ` Andy Lutomirski
2014-04-17 19:10                                                 ` Simo Sorce
2014-04-17 19:16                                                   ` Vivek Goyal
2014-04-17 19:46                                                     ` Andy Lutomirski
2014-04-21 15:03                                                       ` Vivek Goyal
2014-04-21 15:47                                                         ` Andy Lutomirski
2014-04-23 15:07                                                           ` Vivek Goyal
2014-04-23 15:37                                                             ` Andy Lutomirski
2014-04-23 16:01                                                               ` Vivek Goyal
2014-04-17 19:23                                                 ` Andy Lutomirski
2014-04-17 17:52                                         ` Simo Sorce
2014-04-17 18:04                                           ` Andy Lutomirski
2014-04-17 18:31                                             ` Simo Sorce
2014-04-17 16:38                             ` Vivek Goyal [this message]
2014-04-17 16:05                         ` Andy Lutomirski
2014-04-17 16:12                         ` Vivek Goyal
2014-04-23 16:45         ` Vivek Goyal
2014-04-23 17:29           ` David Miller
2014-04-24 20:34             ` Vivek Goyal
2014-04-24 20:48               ` David Miller
2014-04-24 21:04                 ` Vivek Goyal
2014-04-24 21:11                   ` David Miller
2014-04-25  0:29                     ` Simo Sorce
2014-04-22 20:05 ` [PATCH 0/2] net: Implement SO_PEERCGROUP and SO_PASSCGROUP socket options David Miller
2014-04-22 20:08   ` Andy Lutomirski
2014-04-22 20:29     ` David Miller
2014-04-22 20:31       ` Andy Lutomirski
2014-04-22 20:32         ` David Miller
2014-04-23  0:37           ` Andy Lutomirski
2014-04-23 19:05         ` Vivek Goyal
2014-04-23 20:53           ` Daniel J Walsh
2014-04-24 13:01             ` Vivek Goyal
2014-04-23 15:55   ` Vivek Goyal
2014-04-23 16:16     ` Vivek Goyal
2014-04-23 17:21     ` Andy Lutomirski

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20140417163827.GA25334@redhat.com \
    --to=vgoyal@redhat.com \
    --cc=cgroups@vger.kernel.org \
    --cc=davem@davemloft.net \
    --cc=dwalsh@redhat.com \
    --cc=kay@redhat.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lpoetter@redhat.com \
    --cc=luto@amacapital.net \
    --cc=netdev@vger.kernel.org \
    --cc=ssorce@redhat.com \
    --cc=tj@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).