On Tue, Sep 14, 2021 at 10:32:13AM -0400, Vivek Goyal wrote: Good morning, I hope the day is going well for everyone. > On Tue, Sep 14, 2021 at 09:59:19AM -0400, Bruce Fields wrote: > > On Tue, Sep 14, 2021 at 8:52 AM Vivek Goyal <vgoyal@xxxxxxxxxx> wrote: > > > Same is the requirement for regular containers and that's why > > > podman (and possibly other container managers), make top level > > > storage directory only readable and searchable by root, so that > > > unpriveleged entities on host can not access container root filesystem > > > data. > > > > Note--if that directory is on NFS, making it readable and searchable > > by root is very weak protection, since it's often possible for an > > attacker to guess filehandles and access objects without the need for > > directory lookups. > open_by_handle_at() requires CAP_DAC_READ_SEARCH. And if you have > CAP_DAC_READ_SEARCH, you don't need to even guess file handles. You > should be able to read/search through all directories, IIUC. > > So how does one make sure that shared directory on host is not > accessible to unprivileged entities. If making directory accessible > to root only is weaker security, what are the options for stronger > security. I've been watching this thread, with some interest, given what we have been working on with respect to providing a new security framework that merges IMA and LSM and external security co-processor technology. Some observations based on those experiences and this thread. Casey is an expert on MAC and capability based security systems, unfortunately for our industry, particularly bog standard system administrators, a rarefied set of skills. It may be helpful to consider his concerns and position on the issues involved in the framework of the number of systems that have, and blog posts that recommend, setting 'selinux=0' on the kernel command-line. I believe the best summary of his position on this issue, is the notion that placing security labels, even in transitive form in user accessible attributes, subordinates the security of the guest system, regardless of the MAC policy it implements, to the DAC based policy on the host system. Given that, there are no legitimate security guarantees that are inferrable based on the guest MAC policy. A legitimate pundit, could and probably should question, in the face of container filesystems and virtual machine images, whether any type of inferrable security guarantees are possible, but that is a question and argument for another day. I didn't see any mention of EVM brought up in these discussions, which may provide some options to improve the security integrity state of the guest. The 800 pound gorilla in the corner in all of this, is that inferrable security guarantees in guests require a certifiable chain of trust from the creator of the object to the kernel context that is making the security gating decisions on the object. A hard to implement and prove concept in bare metal trusted systems, let alone the myriad of edge cases lurking in namespaced and virtual environments. Which, in a nod to the other corner of the ring, may simply mean, with our current state of deployable technology, you pay your money and take your chances in these virtual environments. Which would in turn support the notion of a minimum security, ie. DAC, based effort. > Vivek Have a good remainder of the week. Dr. Greg As always, Dr. Greg Wettstein, Ph.D, Worker Autonomously self-defensive Enjellic Systems Development, LLC IOT platforms and edge devices. 4206 N. 19th Ave. Fargo, ND 58102 PH: 701-281-1686 EMAIL: dg@xxxxxxxxxxxx ------------------------------------------------------------------------------ "This place is so screwed up. It's just like the Titanic, only we don't even have a band playing. -- Terrance George Wieland Resurrection.