Linux-Fsdevel Archive on lore.kernel.org help / color / mirror / Atom feed
From: "Mickaël Salaün" <mic@digikod.net> To: linux-kernel@vger.kernel.org Cc: "Mickaël Salaün" <mic@digikod.net>, "Aleksa Sarai" <cyphar@cyphar.com>, "Alexei Starovoitov" <ast@kernel.org>, "Al Viro" <viro@zeniv.linux.org.uk>, "Andrew Morton" <akpm@linux-foundation.org>, "Andy Lutomirski" <luto@kernel.org>, "Christian Brauner" <christian.brauner@ubuntu.com>, "Christian Heimes" <christian@python.org>, "Daniel Borkmann" <daniel@iogearbox.net>, "Deven Bowers" <deven.desai@linux.microsoft.com>, "Dmitry Vyukov" <dvyukov@google.com>, "Eric Biggers" <ebiggers@kernel.org>, "Eric Chiang" <ericchiang@google.com>, "Florian Weimer" <fweimer@redhat.com>, "James Morris" <jmorris@namei.org>, "Jan Kara" <jack@suse.cz>, "Jann Horn" <jannh@google.com>, "Jonathan Corbet" <corbet@lwn.net>, "Kees Cook" <keescook@chromium.org>, "Lakshmi Ramasubramanian" <nramas@linux.microsoft.com>, "Matthew Garrett" <mjg59@google.com>, "Matthew Wilcox" <willy@infradead.org>, "Michael Kerrisk" <mtk.manpages@gmail.com>, "Mimi Zohar" <zohar@linux.ibm.com>, "Philippe Trébuchet" <philippe.trebuchet@ssi.gouv.fr>, "Scott Shell" <scottsh@microsoft.com>, "Sean Christopherson" <sean.j.christopherson@intel.com>, "Shuah Khan" <shuah@kernel.org>, "Steve Dower" <steve.dower@python.org>, "Steve Grubb" <sgrubb@redhat.com>, "Tetsuo Handa" <penguin-kernel@I-love.SAKURA.ne.jp>, "Thibaut Sautereau" <thibaut.sautereau@clip-os.org>, "Vincent Strubel" <vincent.strubel@ssi.gouv.fr>, kernel-hardening@lists.openwall.com, linux-api@vger.kernel.org, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: [PATCH v7 0/7] Add support for O_MAYEXEC Date: Thu, 23 Jul 2020 19:12:20 +0200 [thread overview] Message-ID: <20200723171227.446711-1-mic@digikod.net> (raw) Hi, This seventh patch series do not set __FMODE_EXEC for the sake of simplicity. A notification feature could be added later if needed. The handling of all file types is now well defined and tested: by default, when opening a path, access to a directory is denied (with EISDIR), access to a regular file depends on the sysctl policy, and access to other file types (i.e. fifo, device, socket) is denied if there is any enforced policy. There is new tests covering all these cases (cf. test_file_types() ). As requested by Mimi Zohar, I completed the series with one of her patches for IMA. I also picked Kees Cook's patches to consolidate exec permission checking into do_filp_open()'s flow. # Goal of O_MAYEXEC The goal of this patch series is to enable to control script execution with interpreters help. A new O_MAYEXEC flag, usable through openat2(2), is added to enable userspace script interpreters to delegate to the kernel (and thus the system security policy) the permission to interpret/execute scripts or other files containing what can be seen as commands. A simple system-wide security policy can be enforced by the system administrator through a sysctl configuration consistent with the mount points or the file access rights. The documentation patch explains the prerequisites. Furthermore, the security policy can also be delegated to an LSM, either a MAC system or an integrity system. For instance, the new kernel MAY_OPENEXEC flag closes a major IMA measurement/appraisal interpreter integrity gap by bringing the ability to check the use of scripts [1]. Other uses are expected, such as for magic-links [2], SGX integration [3], bpffs [4] or IPE [5]. # Prerequisite of its use Userspace needs to adapt to take advantage of this new feature. For example, the PEP 578 [6] (Runtime Audit Hooks) enables Python 3.8 to be extended with policy enforcement points related to code interpretation, which can be used to align with the PowerShell audit features. Additional Python security improvements (e.g. a limited interpreter withou -c, stdin piping of code) are on their way [7]. # Examples The initial idea comes from CLIP OS 4 and the original implementation has been used for more than 12 years: https://github.com/clipos-archive/clipos4_doc Chrome OS has a similar approach: https://chromium.googlesource.com/chromiumos/docs/+/master/security/noexec_shell_scripts.md Userland patches can be found here: https://github.com/clipos-archive/clipos4_portage-overlay/search?q=O_MAYEXEC Actually, there is more than the O_MAYEXEC changes (which matches this search) e.g., to prevent Python interactive execution. There are patches for Bash, Wine, Java (Icedtea), Busybox's ash, Perl and Python. There are also some related patches which do not directly rely on O_MAYEXEC but which restrict the use of browser plugins and extensions, which may be seen as scripts too: https://github.com/clipos-archive/clipos4_portage-overlay/tree/master/www-client An introduction to O_MAYEXEC was given at the Linux Security Summit Europe 2018 - Linux Kernel Security Contributions by ANSSI: https://www.youtube.com/watch?v=chNjCRtPKQY&t=17m15s The "write xor execute" principle was explained at Kernel Recipes 2018 - CLIP OS: a defense-in-depth OS: https://www.youtube.com/watch?v=PjRE0uBtkHU&t=11m14s See also an overview article: https://lwn.net/Articles/820000/ This patch series can be applied on top of v5.8-rc5 . This can be tested with CONFIG_SYSCTL. I would really appreciate constructive comments on this patch series. Previous version: https://lore.kernel.org/lkml/20200505153156.925111-1-mic@digikod.net/ [1] https://lore.kernel.org/lkml/1544647356.4028.105.camel@linux.ibm.com/ [2] https://lore.kernel.org/lkml/20190904201933.10736-6-cyphar@cyphar.com/ [3] https://lore.kernel.org/lkml/CALCETrVovr8XNZSroey7pHF46O=kj_c5D9K8h=z2T_cNrpvMig@mail.gmail.com/ [4] https://lore.kernel.org/lkml/CALCETrVeZ0eufFXwfhtaG_j+AdvbzEWE0M3wjXMWVEO7pj+xkw@mail.gmail.com/ [5] https://lore.kernel.org/lkml/20200406221439.1469862-12-deven.desai@linux.microsoft.com/ [6] https://www.python.org/dev/peps/pep-0578/ [7] https://lore.kernel.org/lkml/0c70debd-e79e-d514-06c6-4cd1e021fa8b@python.org/ Regards, Kees Cook (3): exec: Change uselib(2) IS_SREG() failure to EACCES exec: Move S_ISREG() check earlier exec: Move path_noexec() check earlier Mickaël Salaün (3): fs: Introduce O_MAYEXEC flag for openat2(2) fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC selftest/openat2: Add tests for O_MAYEXEC enforcing Mimi Zohar (1): ima: add policy support for the new file open MAY_OPENEXEC flag Documentation/ABI/testing/ima_policy | 2 +- Documentation/admin-guide/sysctl/fs.rst | 49 +++ fs/exec.c | 23 +- fs/fcntl.c | 2 +- fs/namei.c | 36 +- fs/open.c | 12 +- include/linux/fcntl.h | 2 +- include/linux/fs.h | 3 + include/uapi/asm-generic/fcntl.h | 7 + kernel/sysctl.c | 12 +- security/integrity/ima/ima_main.c | 3 +- security/integrity/ima/ima_policy.c | 15 +- tools/testing/selftests/kselftest_harness.h | 3 + tools/testing/selftests/openat2/Makefile | 3 +- tools/testing/selftests/openat2/config | 1 + tools/testing/selftests/openat2/helpers.h | 1 + .../testing/selftests/openat2/omayexec_test.c | 325 ++++++++++++++++++ 17 files changed, 470 insertions(+), 29 deletions(-) create mode 100644 tools/testing/selftests/openat2/config create mode 100644 tools/testing/selftests/openat2/omayexec_test.c -- 2.27.0
next reply other threads:[~2020-07-23 17:13 UTC|newest] Thread overview: 43+ messages / expand[flat|nested] mbox.gz Atom feed top 2020-07-23 17:12 Mickaël Salaün [this message] 2020-07-23 17:12 ` [PATCH v7 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES Mickaël Salaün 2020-08-11 18:59 ` Eric W. Biederman 2020-08-11 19:14 ` Eric W. Biederman 2020-07-23 17:12 ` [PATCH v7 2/7] exec: Move S_ISREG() check earlier Mickaël Salaün 2020-08-11 19:27 ` Eric W. Biederman 2020-07-23 17:12 ` [PATCH v7 3/7] exec: Move path_noexec() " Mickaël Salaün 2020-08-11 19:36 ` Eric W. Biederman 2020-08-13 15:31 ` Mickaël Salaün 2020-07-23 17:12 ` [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2) Mickaël Salaün 2020-07-24 19:03 ` Kees Cook 2020-07-27 4:21 ` Al Viro 2020-07-27 5:27 ` Florian Weimer 2020-07-27 19:46 ` Mickaël Salaün 2020-08-11 19:51 ` Eric W. Biederman 2020-08-13 14:36 ` Mickaël Salaün 2020-07-23 17:12 ` [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC Mickaël Salaün 2020-07-24 19:03 ` Kees Cook 2020-08-11 19:58 ` Eric W. Biederman 2020-08-13 14:49 ` Mickaël Salaün 2020-07-23 17:12 ` [PATCH v7 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing Mickaël Salaün 2020-07-24 19:03 ` Kees Cook 2020-07-23 17:12 ` [PATCH v7 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag Mickaël Salaün 2020-07-24 19:04 ` Kees Cook 2020-07-24 11:20 ` [PATCH v7 0/7] Add support for O_MAYEXEC Thibaut Sautereau 2020-07-24 19:06 ` Kees Cook 2020-07-25 11:15 ` Christian Brauner 2020-08-10 20:11 ` Mickaël Salaün 2020-08-10 20:21 ` Al Viro 2020-08-10 22:09 ` David Laight 2020-08-10 22:28 ` Al Viro 2020-08-10 22:47 ` Mickaël Salaün 2020-08-11 8:09 ` David Laight 2020-08-11 8:50 ` Mickaël Salaün 2020-08-10 22:43 ` Mickaël Salaün 2020-08-10 23:03 ` Jann Horn 2020-08-11 8:48 ` Mickaël Salaün 2020-08-11 13:56 ` Mimi Zohar 2020-08-11 14:02 ` Matthew Wilcox 2020-08-11 14:30 ` Mimi Zohar 2020-08-11 17:18 ` Deven Bowers 2020-08-10 23:05 ` Al Viro 2020-08-11 8:49 ` Mickaël Salaün
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20200723171227.446711-1-mic@digikod.net \ --to=mic@digikod.net \ --cc=akpm@linux-foundation.org \ --cc=ast@kernel.org \ --cc=christian.brauner@ubuntu.com \ --cc=christian@python.org \ --cc=corbet@lwn.net \ --cc=cyphar@cyphar.com \ --cc=daniel@iogearbox.net \ --cc=deven.desai@linux.microsoft.com \ --cc=dvyukov@google.com \ --cc=ebiggers@kernel.org \ --cc=ericchiang@google.com \ --cc=fweimer@redhat.com \ --cc=jack@suse.cz \ --cc=jannh@google.com \ --cc=jmorris@namei.org \ --cc=keescook@chromium.org \ --cc=kernel-hardening@lists.openwall.com \ --cc=linux-api@vger.kernel.org \ --cc=linux-fsdevel@vger.kernel.org \ --cc=linux-integrity@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-security-module@vger.kernel.org \ --cc=luto@kernel.org \ --cc=mjg59@google.com \ --cc=mtk.manpages@gmail.com \ --cc=nramas@linux.microsoft.com \ --cc=penguin-kernel@I-love.SAKURA.ne.jp \ --cc=philippe.trebuchet@ssi.gouv.fr \ --cc=scottsh@microsoft.com \ --cc=sean.j.christopherson@intel.com \ --cc=sgrubb@redhat.com \ --cc=shuah@kernel.org \ --cc=steve.dower@python.org \ --cc=thibaut.sautereau@clip-os.org \ --cc=vincent.strubel@ssi.gouv.fr \ --cc=viro@zeniv.linux.org.uk \ --cc=willy@infradead.org \ --cc=zohar@linux.ibm.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).