qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: Eric Blake <eblake@redhat.com>
To: "Daniel P. Berrange" <berrange@redhat.com>, qemu-devel@nongnu.org
Cc: "Paolo Bonzini" <pbonzini@redhat.com>,
	qemu-block@nongnu.org, "Markus Armbruster" <armbru@redhat.com>,
	"Andreas Färber" <afaerber@suse.de>,
	"Max Reitz" <mreitz@redhat.com>
Subject: Re: [Qemu-devel] [PATCH v3 10/10] vnc: allow specifying a custom ACL object name
Date: Tue, 22 Mar 2016 15:38:14 -0600	[thread overview]
Message-ID: <56F1BB46.3090407@redhat.com> (raw)
In-Reply-To: <1457636396-24983-10-git-send-email-berrange@redhat.com>

[-- Attachment #1: Type: text/plain, Size: 5342 bytes --]

On 03/10/2016 11:59 AM, Daniel P. Berrange wrote:
> The VNC server has historically had support for ACLs to check
> both the SASL username and the TLS x509 distinguished name.
> The VNC server was responsible for creating the initial ACL,
> and the client app was then responsible for populating it with
> rules using the HMP 'acl_add' command.
> 
> This is not satisfactory for a variety of reasons. There is
> no way to populate the ACLs from the command line, users are
> forced to use the HMP. With multiple network services all
> supporting TLS and ACLs now, it is desirable to be able to
> define a single ACL that is referenced by all services.
> 
> To address these limitations, two new options are added to the
> VNC server CLI. The 'tls-acl' option takes the ID of a QAuthZ
> object to use for checking TLS x509 distinguished names, and
> the 'sasl-acl' option takes the ID of another object to use for
> checking SASL usernames.
> 
> In this example, we setup two ACLs. The first allows any client
> with a certificate issued by the 'RedHat' organization in the
> 'London' locality. The second ACL allows clients with either
> the 'joe@REDHAT.COM' or  'fred@REDHAT.COM' kerberos usernames.
> Both ACLs must pass for the user to be allowed.
> 
>     $QEMU -object tls-creds-x509,id=tls0,dir=/home/berrange/qemutls,\
>                   endpoint=server,verify-peer=yes \
>           -object authz-simple,id=acl0,policy=deny,\
>                   rules.0.match=O=RedHat,,L=London,rules.0.policy=allow \
>           -object authz-simple,id=acl0,policy=deny,\

Umm, you can't reuse 'acl0' as the id.

>                   rules.0.match=fred@REDHAT.COM,rules.0.policy=allow \
>                   rules.0.match=joe@REDHAT.COM,rules.0.policy=allow \
>           -vnc 0.0.0.0:1,tls-creds=tls0,tls-acl=tlsacl0,
> 	       sasl,sasl-acl=saslacl0 \

And this fails because the ids don't exist.  I think you meant
authz-simple,id=tlsacl0 in the first instance, and
authz-simple,id=saslacl0 in the second instance.

>           ...other QEMU args...
> 
> Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
> ---
>  ui/vnc.c | 73 ++++++++++++++++++++++++++++++++++++++++++++++++++++------------
>  1 file changed, 60 insertions(+), 13 deletions(-)
> 
> @@ -3670,6 +3680,21 @@ void vnc_display_open(const char *id, Error **errp)
>          }
>      }
>      acl = qemu_opt_get_bool(opts, "acl", false);
> +    tlsacl = qemu_opt_get(opts, "tls-acl");
> +    if (acl && tlsacl) {
> +        error_setg(errp, "'acl' option is mutually exclusive with the "
> +                   "'tls-acl' options");
> +        goto fail;
> +    }
> +
> +#ifdef CONFIG_VNC_SASL
> +    saslacl = qemu_opt_get(opts, "sasl-acl");
> +    if (acl && saslacl) {
> +        error_setg(errp, "'acl' option is mutually exclusive with the "
> +                   "'sasl-acl' options");
> +        goto fail;
> +    }
> +#endif

Do we explicitly fail if sasl-acl was provided but CONFIG_VNC_SASL is
not defined?  It looks here like you silently ignore it, which would not
be good.

> @@ -3710,19 +3737,39 @@ void vnc_display_open(const char *id, Error **errp)
>                            &error_abort);
>      }
>  #ifdef CONFIG_VNC_SASL
> -    if (acl && sasl) {
> -        char *aclname;
> +    if (sasl) {
> +        if (saslacl) {
> +            Object *container, *acl;
> +            container = object_get_objects_root();
> +            acl = object_resolve_path_component(container, saslacl);
> +            if (!acl) {
> +                error_setg(errp, "Cannot find ACL %s", saslacl);
> +                goto fail;
> +            }
>  
> -        if (strcmp(vs->id, "default") == 0) {
> -            aclname = g_strdup("vnc.username");
> -        } else {
> -            aclname = g_strdup_printf("vnc.%s.username", vs->id);
> -        }
> -        vs->sasl.acl =
> -            QAUTHZ(qauthz_simple_new(aclname,
> -                                     QAUTHZ_SIMPLE_POLICY_DENY,
> -                                     &error_abort));
> -        g_free(aclname);
> +            if (!object_dynamic_cast(acl, TYPE_QAUTHZ)) {
> +                error_setg(errp, "Object '%s' is not a QAuthZ subclass",
> +                           saslacl);
> +                goto fail;
> +            }
> +            vs->sasl.acl = QAUTHZ(acl);
> +        } else if (acl) {
> +            char *aclname;
> +
> +            if (strcmp(vs->id, "default") == 0) {
> +                aclname = g_strdup("vnc.username");
> +            } else {
> +                aclname = g_strdup_printf("vnc.%s.username", vs->id);
> +            }
> +            vs->sasl.acl =
> +                QAUTHZ(qauthz_simple_new(aclname,
> +                                         QAUTHZ_SIMPLE_POLICY_DENY,
> +                                         &error_abort));
> +            g_free(aclname);
> +        }
> +    } else if (saslacl) {
> +        error_setg(errp, "SASL ACL provided when SASL is disabled");
> +        goto fail;
>      }
>  #endif
>  

Again, the saslacl check is only mentioned inside the #if; what happens
when the #if is not compiled?

-- 
Eric Blake   eblake redhat com    +1-919-301-3266
Libvirt virtualization library http://libvirt.org


[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 604 bytes --]

  reply	other threads:[~2016-03-22 21:38 UTC|newest]

Thread overview: 32+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-03-10 18:51 [Qemu-devel] [PATCH v3 00/10] Provide a QOM-based authorization API Daniel P. Berrange
2016-03-10 18:59 ` [Qemu-devel] [PATCH v3 01/10] qdict: implement a qdict_crumple method for un-flattening a dict Daniel P. Berrange
2016-03-10 18:59   ` [Qemu-devel] [PATCH v3 02/10] qapi: allow QmpInputVisitor to auto-cast types Daniel P. Berrange
2016-03-21 23:18     ` Eric Blake
2016-03-22 15:49       ` Daniel P. Berrange
2016-03-22 16:20         ` Eric Blake
2016-03-10 18:59   ` [Qemu-devel] [PATCH v3 03/10] qom: support arbitrary non-scalar properties with -object Daniel P. Berrange
2016-03-21 23:27     ` Eric Blake
2016-03-22  9:07       ` Markus Armbruster
2016-03-22 10:34         ` Daniel P. Berrange
2016-03-22 15:51       ` Daniel P. Berrange
2016-03-10 18:59   ` [Qemu-devel] [PATCH v3 04/10] util: add QAuthZ object as an authorization base class Daniel P. Berrange
2016-03-22 16:33     ` Eric Blake
2016-03-22 16:43       ` Daniel P. Berrange
2016-03-22 16:44       ` Daniel P. Berrange
2016-03-10 18:59   ` [Qemu-devel] [PATCH v3 05/10] util: add QAuthZSimple object type for a simple access control list Daniel P. Berrange
2016-03-22 17:38     ` Eric Blake
2016-03-23 12:38       ` Daniel P. Berrange
2016-03-10 18:59   ` [Qemu-devel] [PATCH v3 06/10] acl: delete existing ACL implementation Daniel P. Berrange
2016-03-22 17:58     ` Eric Blake
2016-03-10 18:59   ` [Qemu-devel] [PATCH v3 07/10] qemu-nbd: add support for ACLs for TLS clients Daniel P. Berrange
2016-03-22 18:14     ` Eric Blake
2016-03-23 12:40       ` Daniel P. Berrange
2016-03-10 18:59   ` [Qemu-devel] [PATCH v3 08/10] nbd: allow an ACL to be set with nbd-server-start QMP command Daniel P. Berrange
2016-03-22 18:19     ` Eric Blake
2016-03-10 18:59   ` [Qemu-devel] [PATCH v3 09/10] chardev: add support for ACLs for TLS clients Daniel P. Berrange
2016-03-22 21:26     ` Eric Blake
2016-03-10 18:59   ` [Qemu-devel] [PATCH v3 10/10] vnc: allow specifying a custom ACL object name Daniel P. Berrange
2016-03-22 21:38     ` Eric Blake [this message]
2016-03-23 12:43       ` Daniel P. Berrange
2016-03-21 22:45   ` [Qemu-devel] [PATCH v3 01/10] qdict: implement a qdict_crumple method for un-flattening a dict Eric Blake
2016-03-22 15:44     ` Daniel P. Berrange

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=56F1BB46.3090407@redhat.com \
    --to=eblake@redhat.com \
    --cc=afaerber@suse.de \
    --cc=armbru@redhat.com \
    --cc=berrange@redhat.com \
    --cc=mreitz@redhat.com \
    --cc=pbonzini@redhat.com \
    --cc=qemu-block@nongnu.org \
    --cc=qemu-devel@nongnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).