Re: problem when testing recent cifs.upcall

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2017-02-23 at 19:35 -0500, Jeff Layton wrote:
> On Thu, 2017-02-23 at 18:46 -0500, Simo Sorce wrote:
> > On Thu, 2017-02-23 at 16:42 -0500, Jeff Layton wrote:
> > > On Thu, 2017-02-23 at 16:30 -0500, Jeff Layton wrote:
> > > > On Thu, 2017-02-23 at 16:10 -0500, Jeff Layton wrote:
> > > > > On Thu, 2017-02-23 at 14:18 -0600, Chad William Seys wrote:
> > > > > > > To be clear...I assume that you have a keytab set up someplace that
> > > > > > > has the smbadmin@ credentials in it, correct? That's the only way
> > > > > > > that cifs.upcall would instantiate a new credcache.
> > > > > > 
> > > > > > Right.  smbadmin@ credentials are in /etc/krb5.keytab.  'mount' must
> > > > > > check there by default.
> > > > > > 
> > > > > > > It sounds like you're walking into the DFS mount in a task that is
> > > > > > > running as root, but that has inherited a KRB5CCNAME environment
> > > > > > > variable from a cwseys@ login session.
> > > > > > 
> > > > > > The task that is walking into the DFS mount is running as 'cwseys' .  My
> > > > > > guess is that when cwseys tries to cd into DFS mount, cifs.upcall or the
> > > > > > kernel is using the wrong name for root's credential cache.
> > > > > > 
> > > > > > > It might be nice to see the debug level output from syslog, so we can
> > > > > > > tell what's actually happening in the upcall. Can you provide that?
> > > > > > 
> > > > > > 
> > > > > > cwseys:Simo.> 
> > > > > > > --> To unsubscribe from this list: send the line
> > > > > > "unsubscribe linux-cifs" in> the body of a message to
> > > > > > majordomo@xxxxxxxxxxxxxxx> More majordomo info at  http://vge
> > > > > > r.kernel.org/majordomo-info.html
> > > > > > 
> > > > > > $ kdestroy
> > > > > > $ cd /
> > > > > > 
> > > > > > root:
> > > > > > # umount /smb
> > > > > > # umount /smb  # to be sure!
> > > > > > # kdestroy
> > > > > > #  ls /tmp/krb5cc_* -al
> > > > > > ls: cannot access '/tmp/krb5cc_*': No such file or directory
> > > > > > 
> > > > > > cwseys:
> > > > > > $ kinit
> > > > > > Password for cwseys@xxxxxxxxxxxxxxxx:
> > > > > > $ ls /tmp/krb5cc_* -al
> > > > > > -rw------- 1 cwseys cwseys 939 Feb 23 12:59 /tmp/krb5cc_1494_sM11PG
> > > > > > 
> > > > > > $ klist -c /tmp/krb5cc_1494_sM11PG
> > > > > > Ticket cache: FILE:/tmp/krb5cc_1494_sM11PG
> > > > > > Default principal: cwseys@xxxxxxxxxxxxxxxx
> > > > > > 
> > > > > > Valid starting       Expires              Service principal
> > > > > > 02/23/2017 12:59:00  03/05/2017 12:58:57
> > > > > > krbtgt/PHYSICS.WISC.EDU@xxxxxxxxxxxxxxxx
> > > > > > 
> > > > > > 
> > > > > > root:
> > > > > > # mount -t cifs //smb.physics.wisc.edu/smb /smb
> > > > > > -osec=krb5,multiuser,username=smbadmin@xxxxxxxxxxxxxxxx --verbose
> > > > > > mount.cifs kernel mount options:
> > > > > > ip=128.104.160.17,unc=\\smb.physics.wisc.edu\smb,sec=krb5,multiuser,user=smbadmin@xxxxxxxxxxxxxxxx,pass=********
> > > > > > 
> > > > > > #  ls /tmp/krb5cc_* -al
> > > > > > -rw------- 1 root   root   1046 Feb 23 13:00 /tmp/krb5cc_0
> > > > > > -rw------- 1 cwseys cwseys  939 Feb 23 12:59 /tmp/krb5cc_1494_sM11PG
> > > > > > 
> > > > > > # klist -c /tmp/krb5cc_0
> > > > > > Ticket cache: FILE:/tmp/krb5cc_0
> > > > > > Default principal: smbadmin@xxxxxxxxxxxxxxxx
> > > > > > 
> > > > > > Valid starting       Expires              Service principal
> > > > > > 02/23/2017 13:00:01  03/05/2017 13:00:01
> > > > > > krbtgt/PHYSICS.WISC.EDU@xxxxxxxxxxxxxxxx
> > > > > > 02/23/2017 13:00:01  03/05/2017 13:00:01
> > > > > > cifs/smb.physics.wisc.edu@xxxxxxxxxxxxxxxx
> > > > > > 
> > > > > > [debug.log after mount]
> > > > > > Feb 23 13:00:01 trog cifs.upcall: key description:
> > > > > > cifs.spnego;0;0;39010000;ver=0x2;host=smb.physics.wisc.edu;ip4=128.104.160
> > > > > > .17;sec=krb5;uid=0x0;creduid=0x0;user=smbadmin@xxxxxxxxxxxxxxxx;pid=0x6abf
> > > > > > Feb 23 13:00:01 trog cifs.upcall: ver=2
> > > > > > Feb 23 13:00:01 trog cifs.upcall: host=smb.physics.wisc.edu
> > > > > > Feb 23 13:00:01 trog cifs.upcall: ip=128.104.160.17
> > > > > > Feb 23 13:00:01 trog cifs.upcall: sec=1
> > > > > > Feb 23 13:00:01 trog cifs.upcall: uid=0
> > > > > > Feb 23 13:00:01 trog cifs.upcall: creduid=0
> > > > > > Feb 23 13:00:01 trog cifs.upcall: user=smbadmin@xxxxxxxxxxxxxxxx
> > > > > > Feb 23 13:00:01 trog cifs.upcall: pid=27327
> > > > > > Feb 23 13:00:01 trog cifs.upcall: get_cachename_from_process_env:
> > > > > > pathname=/proc/27327/environ
> > > > > > Feb 23 13:00:01 trog cifs.upcall: get_existing_cc: default ccache is
> > > > > > FILE:/tmp/krb5cc_0
> > > > > > Feb 23 13:00:01 trog cifs.upcall: get_tgt_time: unable to get principal
> > > > > > Feb 23 13:00:01 trog cifs.upcall: handle_krb5_mech: getting service
> > > > > > ticket for smb.physics.wisc.edu
> > > > > > Feb 23 13:00:01 trog cifs.upcall: handle_krb5_mech: obtained service ticket
> > > > > > Feb 23 13:00:01 trog cifs.upcall: Exit status 0
> > > > > > Feb 23 13:00:01 trog cifs.upcall: key description:
> > > > > > cifs.spnego;0;0;39010000;ver=0x2;host=smb.physics.wisc.edu;ip4=128.104.160.17;sec=krb5;uid=0x0;creduid=0x0;user=smbadmin@xxxxxxxxxxxxxxxx;pid=0x6abf
> > > > > > Feb 23 13:00:01 trog cifs.upcall: ver=2
> > > > > > Feb 23 13:00:01 trog cifs.upcall: host=smb.physics.wisc.edu
> > > > > > Feb 23 13:00:01 trog cifs.upcall: ip=128.104.160.17
> > > > > > Feb 23 13:00:01 trog cifs.upcall: sec=1
> > > > > > Feb 23 13:00:01 trog cifs.upcall: uid=0
> > > > > > Feb 23 13:00:01 trog cifs.upcall: creduid=0
> > > > > > Feb 23 13:00:01 trog cifs.upcall: user=smbadmin@xxxxxxxxxxxxxxxx
> > > > > > Feb 23 13:00:01 trog cifs.upcall: pid=27327
> > > > > > Feb 23 13:00:01 trog cifs.upcall: get_cachename_from_process_env:
> > > > > > pathname=/proc/27327/environ
> > > > > > Feb 23 13:00:01 trog cifs.upcall: get_existing_cc: default ccache is
> > > > > > FILE:/tmp/krb5cc_0
> > > > > > Feb 23 13:00:01 trog cifs.upcall: handle_krb5_mech: getting service
> > > > > > ticket for smb.physics.wisc.edu
> > > > > > Feb 23 13:00:01 trog cifs.upcall: handle_krb5_mech: obtained service ticket
> > > > > > Feb 23 13:00:01 trog cifs.upcall: Exit status 0
> > > > > > Feb 23 13:00:01 trog cifs.upcall: key description:
> > > > > > cifs.spnego;0;0;39010000;ver=0x2;host=smb.physics.wisc.edu;ip4=128.104.160.17;sec=krb5;uid=0x5d6;creduid=0x5d6;pid=0x6725
> > > > > > Feb 23 13:00:01 trog cifs.upcall: ver=2
> > > > > > Feb 23 13:00:01 trog cifs.upcall: host=smb.physics.wisc.edu
> > > > > > Feb 23 13:00:01 trog cifs.upcall: ip=128.104.160.17
> > > > > > Feb 23 13:00:01 trog cifs.upcall: sec=1
> > > > > > Feb 23 13:00:01 trog cifs.upcall: uid=1494
> > > > > > Feb 23 13:00:01 trog cifs.upcall: creduid=1494
> > > > > > Feb 23 13:00:01 trog cifs.upcall: pid=26405
> > > > > > Feb 23 13:00:01 trog cifs.upcall: get_cachename_from_process_env:
> > > > > > pathname=/proc/26405/environ
> > > > > > Feb 23 13:00:01 trog cifs.upcall: get_cachename_from_process_env:
> > > > > > cachename = FILE:/tmp/krb5cc_1494_bkfO2z
> > > > > > Feb 23 13:00:01 trog cifs.upcall: get_existing_cc: default ccache is
> > > > > > FILE:/tmp/krb5cc_1494_bkfO2z
> > > > > > Feb 23 13:00:01 trog cifs.upcall: get_tgt_time: unable to
> > > > > > gSimo.> 
> > > > > > > --> To unsubscribe from this list: send the line
> > > > > > "unsubscribe linux-cifs" in> the body of a message to
> > > > > > majordomo@xxxxxxxxxxxxxxx> More majordomo info at  http://vge
> > > > > > r.kernel.org/majordomo-info.html
> > > > > > et principal
> > > > > > Feb 23 13:00:01 trog cifs.upcall: Exit status 1
> > > > > > 
> > > > > > cwseys:
> > > > > > $ cd /smb
> > > > > > 
> > > > > > [debug.log after cd /smb]
> > > > > > Feb 23 13:05:20 trog cifs.upcall: key description:
> > > > > > cifs.spnego;0;0;39010000;ver=0x2;host=smb.physics.wisc.edu;ip4=128.104.160.17;sec=krb5;uid=0x5d6;creduid=0x5d6;pid=0x3397
> > > > > > Feb 23 13:05:20 trog cifs.upcall: ver=2
> > > > > > Feb 23 13:05:20 trog cifs.upcall: host=smb.physics.wisc.edu
> > > > > > Feb 23 13:05:20 trog cifs.upcall: ip=128.104.160.17
> > > > > > Feb 23 13:05:20 trog cifs.upcall: sec=1
> > > > > > Feb 23 13:05:20 trog cifs.upcall: uid=1494
> > > > > > Feb 23 13:05:20 trog cifs.upcall: creduid=1494
> > > > > > Feb 23 13:05:20 trog cifs.upcall: pid=13207
> > > > > > Feb 23 13:05:20 trog cifs.upcall: get_cachename_from_process_env:
> > > > > > pathname=/proc/13207/environ
> > > > > > Feb 23 13:05:20 trog cifs.upcall: get_cachename_from_process_env:
> > > > > > cachename = FILE:/tmp/krb5cc_1494_sM11PG
> > > > > > Feb 23 13:05:20 trog cifs.upcall: get_existing_cc: default ccache is
> > > > > > FILE:/tmp/krb5cc_1494_sM11PG
> > > > > > Feb 23 13:05:20 trog cifs.upcall: handle_krb5_mech: getting service
> > > > > > ticket for smb.physics.wisc.edu
> > > > > > Feb 23 13:05:20 trog cifs.upcall: handle_krb5_mech: obtained service ticket
> > > > > > Feb 23 13:05:20 trog cifs.upcall: Exit status 0
> > > > > > 
> > > > > > $ kdestroy
> > > > > > $ ls /tmp/krb5cc_* -al
> > > > > > -rw------- 1 root root 1046 Feb 23 13:00 /tmp/krb5cc_0
> > > > > > 
> > > > > > # obs-cos is on a different server - DFS linked.
> > > > > > $ cd obs-cos
> > > > > > $ ls
> > > > > > ls: cannot open directory '.': Permission denied
> > > > > > 
> > > > > > # kerberos cache file created with root owner/group !
> > > > > > # The file has bytes in it, but not matching the size above. Wonder
> > > > > > # what's in it... ?
> > > > > > $ ls /tmp/krb5cc_* -al
> > > > > > -rw------- 1 root root 1046 Feb 23 13:00 /tmp/krb5cc_0
> > > > > > -rw------- 1 root root 1050 Feb 23 13:05 /tmp/krb5cc_1494_sM11PG
> > > > > > 
> > > > > > # now cannot kinit
> > > > > > $ kinit
> > > > > > Password for cwseys@xxxxxxxxxxxxxxxx:
> > > > > > kinit: Failed to store credentials: Internal credentials cache error
> > > > > > (filename: /tmp/krb5cc_1494_sM11PG) while getting initial credentials
> > > > > > 
> > > > > > root:
> > > > > > # lets look in the credential cache that was created by root.
> > > > > > # looks like credentials used by root to mount /smb:
> > > > > > # My guess is the kernel was trying to stash the
> > > > > > # cifs/smb02.physics.wisc.edu@xxxxxxxxxxxxxxxx
> > > > > > # kerberos ticket, but put it in krb5cc_1494_sM11PG instead
> > > > > > # of krb5cc_0
> > > > > > # klist -c /tmp/krb5cc_1494_sM11PG
> > > > > > Ticket cache: FILE:/tmp/krb5cc_1494_sM11PG
> > > > > > Default principal: smbadmin@xxxxxxxxxxxxxxxx
> > > > > > 
> > > > > > Valid starting       Expires              Service principal
> > > > > > 02/23/2017 13:05:59  03/05/2017 13:05:59
> > > > > > krbtgt/PHYSICS.WISC.EDU@xxxxxxxxxxxxxxxx
> > > > > > 02/23/2017 13:05:59  03/05/2017 13:05:59
> > > > > > cifs/smb02.physics.wisc.edu@xxxxxxxxxxxxxxxx
> > > > > > 
> > > > > > # klist -c /tmp/krb5cc_0
> > > > > > Ticket cache: FILE:/tmp/krb5cc_0
> > > > > > Default principal: smbadmin@xxxxxxxxxxxxxxxx
> > > > > > 
> > > > > > Valid starting       Expires              Service principal
> > > > > > 02/23/2017 13:00:01  03/05/2017 13:00:01
> > > > > > krbtgt/PHYSICS.WISC.EDU@xxxxxxxxxxxxxxxx
> > > > > > 02/23/2017 13:00:01  03/05/2017 13:00:01
> > > > > > cifs/smb.physics.wisc.edu@xxxxxxxxxxxxxxxx
> > > > > > 
> > > > > > [debug.log after trying to cd obs-cos]
> > > > > > vvvvvvvvvvvvvvvvvvvvvvvvvvvv
> > > > > > I think the error is here:  Notice pid=13207, that belongs
> > > > > > to cwseys but cifs.upcall key description is trying to use uid=0 and 
> > > > > > creduid=0 . The credential cache file is correct, but the uid/creduid 
> > > > > > are not.
> > > > > > 
> > > > > > cwseys   13207 /bin/bash
> > > > > > 
> > > > > > Also, in the above the log from 'cd /smb' cifs.upcall used  uid=1494 and 
> > > > > > creduid=1494 .
> > > > > > ^^^^^^^^^^^^^^^^^^^^^^^^^^^
> > > > > > 
> > > > > 
> > > > > Yep, that's clearly the issue. The question is how you're ending up in
> > > > > that situation...
> > > > > 
> > > > > Regardless of how it's happening to you, it's probably possible to fool
> > > > > the environment scraping like this, by triggering a krb5 upcall from
> > > > > the context of a setuid program that has inherited the KRB5CCNAME
> > > > > environment variable from an unprivileged process.
> > > > > 
> > > > > I'm not sure what we can reasonably do about that. I suppose it might
> > > > > be interesting to dump the Uid: line from /proc/pid/status when we do
> > > > > this upcall, and see what all of the values are set to. Maybe we can
> > > > > reject using the credcache if the uid in the upcall doesn't match one
> > > > > of the values?
> > > > > 
> > > > > I'll see if I can cook up a debug patch sometime soon for that.
> > > > > 
> > > > 
> > > > Just out of curiousity. As that unprivileged user, what do you get back
> > > >  if you do this?
> > > > 
> > > >     $ which cd ; ls -l `which cd`
> > > > 
> > > > Thanks,
> > > 
> > > Nevermind, I see the problem. From follow_automount in the pathwalking
> > > code:
> > > 
> > >         old_cred = override_creds(&init_cred);
> > >         mnt = path->dentry->d_op->d_automount(path);
> > >         revert_creds(old_cred);
> > > 
> > > So we end up overriding the process creds in order to do the automount,
> > > which leads to exactly this problem.
> > > 
> > > I think the best we can do here is probably to just not do the
> > > environment scraping if the uid is 0. It's pretty hacky, but hey, we're
> > > already in rather nasty hack territory as it is.
> > > 
> > > Thoughts?
> > 
> > 
> > Can't we detect that the process has changed id ?
> 
> How? The credentials are completely overridden with the init_creds once
> we get into d_automount.
> 
> > Cutting off root may be a way, but I can see how some peoepl may want
> > root too to be able to mount and walk cifs shares ...
> > 
> > 
> 
> Well, root still can with this patch -- just not if his credcache is in
> a non-default location.
> 
> The other option is to just unset the environment var. That will
> probably fix Chad's issue, but my worry there is that root's session
> setup can end up being done with the wrong credcache if cwseys had a
> valid one when he triggers the automount.
> 
> Maybe the right fix is to have mount creds be separate from root's
> creds altogether. You'd have a duplicate session for root in most
> cases, but maybe that's ok?

Sounds sensible, with cifs specifically you may want to use "machine
creds" to mount, and then root creds to walk on the filesystem.

Simo.




--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux