public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Topi Miettinen <toiwoton@gmail.com>
To: linux-kernel@vger.kernel.org, fuse-devel@lists.sourceforge.net
Subject: Re: FUSE proxying for ABI filesystems?
Date: Sun, 29 Mar 2015 20:17:43 +0000	[thread overview]
Message-ID: <55185DE7.60305@gmail.com> (raw)
In-Reply-To: <550DB35E.7090801@gmail.com>

On 03/21/15 18:07, Topi Miettinen wrote:
> Hello all,
> 
> I've made a small control program that intercepts and filters filesystem
> operations of processes launched by it with FUSE. With it, FS operations
> can be filtered by access type (e.g. getattr/read, cf. AppArmor or
> TOMOYO Linux) or for more fine grained control, which area of the file
> is being accessed. This lets me differentiate between, for example,
> 'bash -c exit' and 'bash -c "echo foo;exit"', which is far beyond what
> any current MAC can do. It works even with complex programs like
> iceweasel or chromium with only some slowdown on startup.
> 
> But due to limitations of FUSE, ABI file systems etc. (/proc, /sys,
> certain devices) can't be intercepted very well. For example, it's
> pretty easy (maybe racy) to change readlink("/proc/self") to
> readlink("/proc/$PID_OF_CLIENT"). But handling the client opening TTY
> devices _without_ O_NOCTTY does not look so simple and there seems to be
> a number of other interesting cases. For more fun, the control program
> and its client can be in different namespaces and maybe even the client
> should be able to perform arbitrary mounting and namespace operations,
> even use FUSE recursively.
> 
> I think how to manage this mess would be that it should be possible for
> the control program to switch temporarily its way of viewing and using
> ABI file systems in a way that setfsuid()/setfsgid() does not allow, but
> so that the above cases can be handled reliably.
> 
> For example, a new system calls could be added like setfspid(pid_t
> client_pid) for /proc/self and TTY handling, and maybe something like
> setfsns() for namespace control.

First, I think adding setfspid() would be doable. It should not affect
FUSE, only a new system call would be available that the control program
could use while servicing access requests. I'll try to make a patch to
provoke more discussion.

The other issue, managing various namespace and filesystem/VFS
operations, looks pretty complex. To be comprehensive, the list of
managed operations should include at least (re)mounting and unmounting,
chroot(2), pivot_root(2), unshare(2), and setns(2). FUSE protocol could
be extended for proxying these operations, or a new interface could be
added (VFS in User Space). On kernel side, either approach would touch a
lot of places. By reusing FUSE protocol, the control program could
manage normal FUSE accesses and extended VFS accesses nicely.

But while pretty interesting, I'm not sure this would be worth the
effort because I think attempting to contain a heavily privileged
process by another user space process is probably doomed to fail. Kernel
level MAC systems (while not as fine grained and flexible as I want)
have better chances there.

However, controlling unprivileged programs like browsers is easier, so
simple FUSE approach (i.e. not implementing mount etc) should be good
enough for them and it can still bring added value over kernel's MAC system.

-Topi


      reply	other threads:[~2015-03-29 20:17 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-03-21 18:07 FUSE proxying for ABI filesystems? Topi Miettinen
2015-03-29 20:17 ` Topi Miettinen [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=55185DE7.60305@gmail.com \
    --to=toiwoton@gmail.com \
    --cc=fuse-devel@lists.sourceforge.net \
    --cc=linux-kernel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox