Re: [PATCH v4 0/4] Introduce security_create_user_ns()
From: Eric W. Biederman
Date: Tue Aug 09 2022 - 12:40:32 EST
Paul Moore <paul@xxxxxxxxxxxxxx> writes:
> On Mon, Aug 8, 2022 at 3:26 PM Eric W. Biederman <ebiederm@xxxxxxxxxxxx> wrote:
>> Paul Moore <paul@xxxxxxxxxxxxxx> writes:
>> >> I did provide constructive feedback. My feedback to his problem
>> >> was to address the real problem of bugs in the kernel.
>> >
>> > We've heard from several people who have use cases which require
>> > adding LSM-level access controls and observability to user namespace
>> > creation. This is the problem we are trying to solve here; if you do
>> > not like the approach proposed in this patchset please suggest another
>> > implementation that allows LSMs visibility into user namespace
>> > creation.
>>
>> Please stop, ignoring my feedback, not detailing what problem or
>> problems you are actually trying to be solved, and threatening to merge
>> code into files that I maintain that has the express purpose of breaking
>> my users.
>
> I've heard you talk about bugs being the only reason why people would
> want to ever block user namespaces, but I think we've all seen use
> cases now where it goes beyond that.
I really have not, and I don't appreciate being called a liar.
> However, even if it didn't, the
> need to build high confidence/assurance systems where big chunks of
> functionality can be disabled based on a security policy is a very
> real use case, and this patchset would help enable that.
Details please. What does this look like. What is the overall plan for
attack surface reduction in one of these systems. How does it differ
from seccomp?
How does this differ from setting /proc/sys/user/max_usernamespaces to 0?
Why is it only the user namespace that needs to be modified to implement
such a system?
Why is there no discussion of that in the change description.
> I've noticed
> you like to talk about these hooks being a source of "regressions",
> but access controls are not regressions Eric, they are tools that
> system builders, administrators, and users use to secure their
> systems.
>
> From my perspective, I believe that addresses your feedback around
> "fix the bugs" and "this is a regression", which is the only thing
> I've noted from your responses in this thread and others, but if I'm
> missing something more technical please let me/us know.
Which is a short way of saying that the using this hook for attack
surface reduction without a larger plan will be ineffective. If the
attack surface is not sufficiently reduced it will not achieve a
prevention of exploits and the attacks will still happen and be
successful.
With a change that is designed to prevent exploits not actually doing so
all that is left is breaking userspace and causing maintenance problems.
Earlier I asked to confirm that was the only reason cloudfare was
interested in this change. I have asked that we have an actual
conversation about what is trying to be achieved.
Instead the conversation has simply been about implementation issues
and not about if the code will be worth having. So far in my book the
code very much does not look worth having. That is my technical
judgment and I don't see anyone taking about my arguments or even
really engaging in them.
Since I keep getting blown off, instead of having my concerns addressed
I say this code should not go.
>> You just artificially constrained the problems, so that no other
>> solution is acceptable.
>
> There is a real need to be able to gain both additional visibility and
> access control over user namespace creation, please suggest the
> approach(es) you would find acceptable.
The suggested hook is not at all appropriate for visibility. Either the
user namespace needs to have some state that can be set, or there needs
to be something that is notified when the user namespace goes away. At
best the hook can print an audit message. So the proposed hook is
really not appropriate to add visibility to the user namespace.
For the record I don't object to adding visibility, I am just pointing
out the proposed hook is not appropriate to that task.
What is the need to have an access control?
Why do you need to fundamentally change the design of user namespaces?
Those are questions I have not seen any answers to. Without actual
answers of what the actual problems are I can't have a reasonable
technical conversation.
>> On that basis alone I am object to this whole
>> approach to steam roll over me and my code.
>
> I saw that choice of wording in your last email and thought it a bit
> curious, so I did a quick git log dump on kernel/user_namespace.c and
> I see approximately 31 contributors to that one file. I've always
> thought of the open source maintainer role as more of a "steward" and
> less of an "owner", but that's just my opinion.
As such it is unfortunately my responsibility to say no to badly thought
out proposals. Proposals that will negatively affect the people using
the code I maintain.
My apologies if I have not been more elegant right now when I have been
constantly sick, and tired. People getting scared of user namespaces
for no real reason has been an on-going trend for a decade or so. This
isn't a new issue, and it irritates me that it is still going on. I
have addressed real concerns and fixed code, for many many years.
This round of the people being afraid of user namespaces, I have yet to
find any real concerns.
So when I express my concerns that this is a pointless exercise and
people don't address my concern. I say no.
Eric