Re: [PATCH 0/2] Support for posix ACLs in fuse

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



2016-09-21 19:42 GMT+02:00 Eric W. Biederman <ebiederm@xxxxxxxxxxxx>:
> Andreas Grünbacher <andreas.gruenbacher@xxxxxxxxx> writes:
>
>> 2016-09-21 17:40 GMT+02:00 Eric W. Biederman <ebiederm@xxxxxxxxxxxx>:
>>> Miklos Szeredi <miklos@xxxxxxxxxx> writes:
>>>> 3) How will richacl's fit into this?
>>>
>>> As best as I can read the situation richacl support has not yet been
>>> merged into Linux yet.
>>
>> True. The patches are stuck in Al Viro's inbox since a very long time.
>>
>>> Last I was following the richacl discussion there were some fundamental
>>> features of richacls that were incompatible with the expectations of
>>> ordinary linux applications.
>>
>> Not true.
>>
>>> The negative acls if my memory serves.
>>> That raised some concern if richacls could ever be safely be merged.
>>>
>>> As I recall Christoph Hellwig was a primary on raising those concerns,
>>> and when I read those arguments they seemed persuasive to me.
>>
>> The whole point of Richacls is to be compatible with the POSIX file
>> permission model. Entries that deny permissions are a necessary part
>> of Richacls for various reasons. Christoph doesn't like them, but that
>> doesn't make them any less necessary.
>
> Negative access control permissions are extremly nasty, and cause a lot
> of problems in the real world, especially where they have not existed
> before.   And sometimes where they are rare enough to not have existed
> before.

Not sure what you're trying to say with that last sentence. But
anyway, let me cure you from the myth that "negative permmissions"
don't exist in the traditional UNIX permission model: when the owner
is assigned fewer permissions than the owning group (for example, mode
044), or the owning group is assigned fewer permissions than others
(for example, mode 604), particular users have fewer permissions than
others by virtue of their identity. That property is just expressed
differently in the traditional UNIX permission model and in Richacls.

By the way, here is Christoph's complaint that you're probably
referring to, and my reply:

  http://oss.sgi.com/archives/xfs/2016-03/msg00207.html
  http://oss.sgi.com/archives/xfs/2016-03/msg00219.html

There was no further follow-up by Christoph.

> I am would prefer you taking a measured approach rather than ignoring
> people's concerns.

I've long thought about this, and documented and argued why removing
deny ACEs wouldn't make sense. If you think otherwise, come up with
convincing technical arguments.

> I certainly don't need any kind of ACLs for any kind of files I have
> ever dealt with in practice.  I deal with ACLs and make certain the
> kernel supports them well to ensure there are not nasty bugs waiting
> in the wings.
>
> If my memory serves there are very funny corner cases between negative
> uids ACLs and user namespaces.  The kind that can lead to security
> vulnerabilities etc.
>
> The practical problem I would envision is users using user namespaces to
> enable them to change their uid or gid and that in turn would result in
> negative acls failing to contain deny users access to files.
>
> So I would be very careful with adding negative permission checks that
> are going to be (at best) very error prone to use to the current unix
> permission model.

See above for how it's possible to shoot yourself in the foot in that
way with namespaces already.

Andreas
--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux