From: "Anton V. Boyarshinov" <boyarsh@altlinux.org>
To: Christian Brauner <brauner@kernel.org>
Cc: viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org,
ebiederm@xmission.com, legion@kernel.org, ldv@altlinux.org,
linux-kernel@vger.kernel.org,
kernel-hardening@lists.openwall.com,
Christoph Hellwig <hch@lst.de>,
Linus Torvalds <torvalds@linux-foundation.org>
Subject: Re: [PATCH] Add ability to disallow idmapped mounts
Date: Sat, 5 Feb 2022 10:57:58 +0300 [thread overview]
Message-ID: <20220205105758.1623e78d@tower> (raw)
In-Reply-To: <20220204151032.7q22hgzcil4hqvkl@wittgenstein>
В Fri, 4 Feb 2022 16:10:32 +0100
Christian Brauner <brauner@kernel.org> пишет:
> > It turns off much more than idmapped mounts only. More fine grained
> > control seems better for me.
>
> If you allow user namespaces and not idmapped mounts you haven't reduced
> your attack surface.
I have. And many other people have. People who have creating user
namespaces by unpriviliged user disabled. I find it sad that we have no
tool in mainline kernel to limit users access to creating user
namespaces except complete disabling them. But many distros have that
tools. Different tools with different interfaces and semantics :(
And at least one major GNU/Linux distro disabled idmapped mounts
unconditionally. If I were the author of this functionality, I would
prefer to have a knob then have it unavailible for for so many users. But as you wish.
> An unprivileged user can reach much more
> exploitable code simply via unshare -user --map-root -mount which we
> still allow upstream without a second thought even with all the past and
> present exploits (see
> https://www.openwall.com/lists/oss-security/2022/01/29/1 for a current
> one from this January).
>
> >
> > > They can neither
> > > be created as an unprivileged user nor can they be created inside user
> > > namespaces.
> >
> > But actions of fully privileged user can open non-obvious ways to
> > privilege escalation.
>
> A fully privileged user potentially being able to cause issues is really
> not an argument; especially not for a new sysctl.
> You need root to create idmapped mounts and you need root to turn off
> the new knob.
>
> It also trivially applies to a whole slew of even basic kernel tunables
> basically everything that can be reached by unprivileged users after a
> privileged user has turned it on or configured it.
>
> After 2 years we haven't seen any issue with this code and while I'm not
> promising that there won't ever be issues - nobody can do that - the
> pure suspicion that there could be some is not a justification for
> anything.
next prev parent reply other threads:[~2022-02-05 7:58 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-02-04 6:53 [PATCH] Add ability to disallow idmapped mounts Anton V. Boyarshinov
2022-02-04 9:45 ` Christian Brauner
2022-02-04 10:26 ` Anton V. Boyarshinov
2022-02-04 15:10 ` Christian Brauner
2022-02-05 7:57 ` Anton V. Boyarshinov [this message]
2022-02-05 13:57 ` James Bottomley
2022-02-06 13:47 ` Christian Brauner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20220205105758.1623e78d@tower \
--to=boyarsh@altlinux.org \
--cc=brauner@kernel.org \
--cc=ebiederm@xmission.com \
--cc=hch@lst.de \
--cc=kernel-hardening@lists.openwall.com \
--cc=ldv@altlinux.org \
--cc=legion@kernel.org \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=torvalds@linux-foundation.org \
--cc=viro@zeniv.linux.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox