[PATCH v2] xattr: Enable security.capability in user namespaces
Eric W. Biederman
ebiederm at xmission.com
Thu Jul 13 17:39:10 UTC 2017
Stefan Berger <stefanb at linux.vnet.ibm.com> writes:
> On 07/13/2017 12:40 PM, Theodore Ts'o wrote:
>> On Thu, Jul 13, 2017 at 07:11:36AM -0500, Eric W. Biederman wrote:
>>> The concise summary:
>>>
>>> Today we have the xattr security.capable that holds a set of
>>> capabilities that an application gains when executed. AKA setuid root exec
>>> without actually being setuid root.
>>>
>>> User namespaces have the concept of capabilities that are not global but
>>> are limited to their user namespace. We do not currently have
>>> filesystem support for this concept.
>> So correct me if I am wrong; in general, there will only be one
>> variant of the form:
>>
>> security.foo at uid=15000
>>
>> It's not like there will be:
>>
>> security.foo at uid=1000
>> security.foo at uid=2000
>
> A file shared by 2 containers, one mapping root to uid=1000, the other
> mapping root to uid=2000, will show these two xattrs on the host
> (init_user_ns) once these containers set xattrs on that file.
There is an interesting solution for shared directory trees containing
executables.
Overlayfs is needed if you need those directory trees to be writable and
for the files to show up as owned by uid 0. An overlayfs will have to
do something with the security.capable attribute. So ignoring that case.
If you don't care about the ownership of the files, and read only is
acceptable, and you still don't want to give these executables
capabilities in the initial user namespace. What you can do is
make everything owned by some non-zero uid including the security
capability. Call this non-zero uid image-root.
When the container starts it creates two nested user namespaces first
with image-root mapped to 0. Then with the containers choice of uid
mapped to 0 image-root unmapped. This will ensure the capability
attributes work for all containers that share that root image. And it
ensures the file are read-only from the container.
So I don't think there is ever a case where we would share a filesystem
image where we would need to set multiple security attributes on a file.
>> Otherwise, I suspect that the architecture is going to turn around and
>> bite us in the *ss eventually, because someone will want to do
>> something crazy and the solution will not be scalable.
>
> Can you define what 'scalable' means for you in this context?
> From what I can see sharing a filesystem between multiple containers
> doesn't 'scale well' for virtualizing the xattrs primarily because of
> size limitations of xattrs per file.
Worse than that I believe you will find that filesystems are built on
the assumption that there will be a small number of xattrs per file.
So even if the vfs limitations were lifted the filesystem performance
would suffer.
Even if the filesystem performed well I believe there are other issues
with stat, and simply not having so much meta-data that adminstrators
and tools get confused.
So I believe there are some very good fundamental reasons why we want to
limit the amount of meta-data per file.
Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
More information about the Linux-security-module-archive
mailing list