Util-Linux package development
 help / color / mirror / Atom feed
From: ebiederm@xmission.com (Eric W. Biederman)
To: James Bottomley <James.Bottomley@HansenPartnership.com>
Cc: Karel Zak <kzak@redhat.com>, util-linux@vger.kernel.org
Subject: Re: [PATCH] nsenter: fix ability to enter unprivileged containers
Date: Mon, 18 Apr 2016 16:31:26 -0500	[thread overview]
Message-ID: <8737qisixd.fsf@x220.int.ebiederm.org> (raw)
In-Reply-To: <1461013000.7385.28.camel@HansenPartnership.com> (James Bottomley's message of "Mon, 18 Apr 2016 16:56:40 -0400")

James Bottomley <James.Bottomley@HansenPartnership.com> writes:

> On Mon, 2016-04-18 at 13:26 -0500, Eric W. Biederman wrote:
>> I think we can do this even better with two passes to setns.
>> 
>> A first pass before the user namespace is set (that ignores
>> failures),
>> and a second pass that sets the user namespace first as happens
>> today.
>> 
>> That should satisfy both cases without flags, and would remove the
>> need
>> to remember/guess which kind of container people are using.
>
> Makes sense, so like this?

That looks like it will work, and for the right reasons.

> ---
> From 39cecc604a6c997c328affea52e65d6f67898bf5 Mon Sep 17 00:00:00 2001
> From: James Bottomley <James.Bottomley@HansenPartnership.com>
> Date: Fri, 15 Apr 2016 08:10:20 -0700
> Subject: [PATCH] nsenter: enter namespaces in two passes
>
> We have two use cases for user namespaces, one to elevate the
> privilege of an unprivileged user, in which case we have to enter the
> user namespace before all other namespaces (otherwise there isn't
> enough permission to enter any other namespace).  And the other one is
> where we're deprivileging a user and thus have to enter the user
> namespace last (because that's the point at which we lose the
> privileges).  On the first pass, we start at the position one after
> the user namespace clearing the file descriptors as we close them
> after calling setns().  If setns() fails on the first pass, ignore the
> failure assuming that it will succeed after we enter the user
> namespace.
>
> This fixes
>
> https://github.com/karelzak/util-linux/issues/315
>
> Signed-off-by: James Bottomley <James.Bottomley@HansenPartnership.com>
Acked-by: "Eric W. Biederman" <ebiederm@xmission.com>
>
> diff --git a/sys-utils/nsenter.c b/sys-utils/nsenter.c
> index d8690db..8dbd22b 100644
> --- a/sys-utils/nsenter.c
> +++ b/sys-utils/nsenter.c
> @@ -48,9 +48,11 @@ static struct namespace_file {
>  } namespace_files[] = {
>  	/* Careful the order is significant in this array.
>  	 *
> -	 * The user namespace comes first, so that it is entered
> -	 * first.  This gives an unprivileged user the potential to
> -	 * enter the other namespaces.
> +	 * The user namespace comes either first or last: first if
> +	 * you're using it to increase your privilege and last if
> +	 * you're using it to decrease.  We enter the namespaces in
> +	 * two passes starting initially from offset 1 and then offset
> +	 * 0 if that fails.
>  	 */
>  	{ .nstype = CLONE_NEWUSER,  .name = "ns/user", .fd = -1 },
>  	{ .nstype = CLONE_NEWCGROUP,.name = "ns/cgroup", .fd = -1 },
> @@ -202,7 +204,7 @@ int main(int argc, char *argv[])
>  	};
>  
>  	struct namespace_file *nsfile;
> -	int c, namespaces = 0, setgroups_nerrs = 0, preserve_cred = 0;
> +	int c, pass, namespaces = 0, setgroups_nerrs = 0, preserve_cred = 0;
>  	bool do_rd = false, do_wd = false, force_uid = false, force_gid = false;
>  	int do_fork = -1; /* unknown yet */
>  	uid_t uid = 0;
> @@ -353,19 +355,31 @@ int main(int argc, char *argv[])
>  	}
>  
>  	/*
> -	 * Now that we know which namespaces we want to enter, enter them.
> +	 * Now that we know which namespaces we want to enter, enter
> +	 * them.  Do this in two passes, not entering the user
> +	 * namespace on the first pass.  So if we're deprivileging the
> +	 * container we'll enter the user namespace last and if we're
> +	 * privileging it then we enter the usernamespace first
> +	 * (because the initial setns will fail).
>  	 */
> -	for (nsfile = namespace_files; nsfile->nstype; nsfile++) {
> -		if (nsfile->fd < 0)
> -			continue;
> -		if (nsfile->nstype == CLONE_NEWPID && do_fork == -1)
> -			do_fork = 1;
> -		if (setns(nsfile->fd, nsfile->nstype))
> -			err(EXIT_FAILURE,
> -			    _("reassociate to namespace '%s' failed"),
> -			    nsfile->name);
> -		close(nsfile->fd);
> -		nsfile->fd = -1;
> +	for (pass = 0; pass < 2; pass ++) {
> +		for (nsfile = namespace_files + 1 - pass; nsfile->nstype; nsfile++) {
> +			if (nsfile->fd < 0)
> +				continue;
> +			if (nsfile->nstype == CLONE_NEWPID && do_fork == -1)
> +				do_fork = 1;
> +			if (setns(nsfile->fd, nsfile->nstype)) {
> +				if (pass != 0)
> +					err(EXIT_FAILURE,
> +					    _("reassociate to namespace '%s' failed"),
> +					    nsfile->name);
> +				else
> +					continue;
> +			}
> +
> +			close(nsfile->fd);
> +			nsfile->fd = -1;
> +		}
>  	}
>  
>  	/* Remember the current working directory if I'm not changing it */

  reply	other threads:[~2016-04-18 21:31 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-04-18 12:26 [PATCH] nsenter: fix ability to enter unprivileged containers James Bottomley
2016-04-18 14:33 ` Yuriy M. Kaminskiy
2016-04-18 15:51   ` Yuriy M. Kaminskiy
2016-04-18 15:37 ` James Bottomley
2016-04-18 15:50   ` James Bottomley
2016-04-18 17:11   ` Karel Zak
2016-04-18 17:28     ` James Bottomley
2016-04-18 18:26       ` Eric W. Biederman
2016-04-18 20:56         ` James Bottomley
2016-04-18 21:31           ` Eric W. Biederman [this message]
2016-04-22  9:05           ` Karel Zak
2016-04-18 19:40     ` James Bottomley

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=8737qisixd.fsf@x220.int.ebiederm.org \
    --to=ebiederm@xmission.com \
    --cc=James.Bottomley@HansenPartnership.com \
    --cc=kzak@redhat.com \
    --cc=util-linux@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox