[PATCH v11 12/12] landlock: Document Landlock's network support
Jeff Xu
jeffxu at chromium.org
Fri Jun 23 14:35:33 UTC 2023
On Thu, Jun 22, 2023 at 9:50 AM Mickaël Salaün <mic at digikod.net> wrote:
>
>
> On 13/06/2023 22:12, Mickaël Salaün wrote:
> >
> > On 13/06/2023 12:13, Konstantin Meskhidze (A) wrote:
> >>
> >>
> >> 6/7/2023 8:46 AM, Jeff Xu пишет:
> >>> On Tue, Jun 6, 2023 at 7:09 AM Günther Noack <gnoack at google.com> wrote:
> >>>>
> >>>> On Tue, May 16, 2023 at 12:13:39AM +0800, Konstantin Meskhidze wrote:
> >>>>> Describe network access rules for TCP sockets. Add network access
> >>>>> example in the tutorial. Add kernel configuration support for network.
> >>>>>
> >>>>> Signed-off-by: Konstantin Meskhidze <konstantin.meskhidze at huawei.com>
>
> [...]
>
> >>>>> @@ -28,20 +28,24 @@ appropriately <kernel_support>`.
> >>>>> Landlock rules
> >>>>> ==============
> >>>>>
> >>>>> -A Landlock rule describes an action on an object. An object is currently a
> >>>>> -file hierarchy, and the related filesystem actions are defined with `access
> >>>>> -rights`_. A set of rules is aggregated in a ruleset, which can then restrict
> >>>>> -the thread enforcing it, and its future children.
> >>>>> +A Landlock rule describes an action on a kernel object. Filesystem
> >>>>> +objects can be defined with a file hierarchy. Since the fourth ABI
> >>>>> +version, TCP ports enable to identify inbound or outbound connections.
> >>>>> +Actions on these kernel objects are defined according to `access
> >>>>> +rights`_. A set of rules is aggregated in a ruleset, which
> >>>>> +can then restrict the thread enforcing it, and its future children.
> >>>>
> >>>> I feel that this paragraph is a bit long-winded to read when the
> >>>> additional networking aspect is added on top as well. Maybe it would
> >>>> be clearer if we spelled it out in a more structured way, splitting up
> >>>> the filesystem/networking aspects?
> >>>>
> >>>> Suggestion:
> >>>>
> >>>> A Landlock rule describes an action on an object which the process
> >>>> intends to perform. A set of rules is aggregated in a ruleset,
> >>>> which can then restrict the thread enforcing it, and its future
> >>>> children.
> >>>>
> >>>> The two existing types of rules are:
> >>>>
> >>>> Filesystem rules
> >>>> For these rules, the object is a file hierarchy,
> >>>> and the related filesystem actions are defined with
> >>>> `filesystem access rights`.
> >>>>
> >>>> Network rules (since ABI v4)
> >>>> For these rules, the object is currently a TCP port,
> >>> Remote port or local port ?
> >>>
> >> Both ports - remote or local.
> >
> > Hmm, at first I didn't think it was worth talking about remote or local,
> > but I now think it could be less confusing to specify a bit:
> > "For these rules, the object is the socket identified with a TCP (bind
> > or connect) port according to the related `network access rights`."
> >
> > A port is not a kernel object per see, so I tried to tweak a bit the
> > sentence. I'm not sure such detail (object vs. data) would not confuse
> > users. Any thought?
>
> Well, here is a more accurate and generic definition (using "scope"):
>
> A Landlock rule describes a set of actions intended by a task on a scope
> of objects. A set of rules is aggregated in a ruleset, which can then
> restrict the thread enforcing it, and its future children.
>
> The two existing types of rules are:
>
> Filesystem rules
> For these rules, the scope of objects is a file hierarchy,
> and the related filesystem actions are defined with
> `filesystem access rights`.
>
> Network rules (since ABI v4)
> For these rules, the scope of objects is the sockets identified
> with a TCP (bind or connect) port according to the related
> `network access rights`.
>
>
> What do you think?
>
I found this is clearer to me (mention of bind/connect port).
In networking, "5-tuple" is a well-known term for connection, which is
src/dest ip, src/dest port, protocol. That is why I asked about
src/dest port. It seems that we only support src/dest port at this
moment, right ?
Another feature we could consider is restricting a process to "no
network access, allow out-going , allow incoming", this might overlap
with seccomp, but I think it is convenient to have it in Landlock.
Adding protocol restriction is a low hanging fruit also, for example,
a process might be restricted to UDP only (for RTP packet), and
another process for TCP (for signaling) , etc.
Thanks!
-Jeff Xu
>
> >>>
> >>>> and the related actions are defined with `network access rights`.
More information about the Linux-security-module-archive
mailing list