Re: [RFC PATCH v2 2/3] gssd: using syscalls directly to change thread's identity

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 04/22/2016 04:41 PM, Olga Kornievskaia wrote:
> On Fri, Apr 22, 2016 at 2:38 PM, Steve Dickson <SteveD@xxxxxxxxxx> wrote:
>>
>>
>> On 04/20/2016 05:12 PM, Olga Kornievskaia wrote:
>>> For the threaded version we have to set uid,gid per thread instead
>>> of per process. glibc setresuid() when called from a thread, it'll
>>> send a signal to all other threads to synchronize the uid in all
>>> other threads. To bypass this, we have to call syscall() directly.
>>>
>>> Signed-off-by: Olga Kornievskaia <kolga@xxxxxxxxxx>
>>> Reviewed-by: Steve Dickson <steved@xxxxxxxxxx>
>>> ---
>>>  utils/gssd/gssd_proc.c | 10 ++++++++--
>>>  1 file changed, 8 insertions(+), 2 deletions(-)
>>>
>>> diff --git a/utils/gssd/gssd_proc.c b/utils/gssd/gssd_proc.c
>>> index 581a125..5d9a6db 100644
>>> --- a/utils/gssd/gssd_proc.c
>>> +++ b/utils/gssd/gssd_proc.c
>>> @@ -69,6 +69,7 @@
>>>  #include <netdb.h>
>>>  #include <sys/types.h>
>>>  #include <sys/wait.h>
>>> +#include <syscall.h>
>>>
>>>  #include "gssd.h"
>>>  #include "err_util.h"
>>> @@ -457,7 +458,12 @@ change_identity(uid_t uid)
>>>        * Switch the GIDs. Note that we leave the saved-set-gid alone in an
>>>        * attempt to prevent attacks via ptrace()
>>>        */
>>> -     if (setresgid(pw->pw_gid, pw->pw_gid, -1) != 0) {
>>> +     /* For the threaded version we have to set uid,gid per thread instead
>>> +      * of per process. glibc setresuid() when called from a thread, it'll
>>> +      * send a signal to all other threads to synchronize the uid in all
>>> +      * other threads. To bypass this, we have to call syscall() directly.
>>> +      */
>>> +     if (syscall(SYS_setresgid, pw->pw_gid) != 0) {
>>>               printerr(0, "WARNING: failed to set gid to %u!\n", pw->pw_gid);
>>>               return errno;
>>>       }
>>> @@ -466,7 +472,7 @@ change_identity(uid_t uid)
>>>        * Switch UIDs, but leave saved-set-uid alone to prevent ptrace() by
>>>        * other processes running with this uid.
>>>        */
>>> -     if (setresuid(uid, uid, -1) != 0) {
>>> +     if (syscall(SYS_setresuid, uid) != 0) {
>>>               printerr(0, "WARNING: Failed to setuid for user with uid %u\n",
>>>                               uid);
>>>               return errno;
>>>
>> We also have to do the same thing to the setgroups() call at the
>> top of change_identity(). So add the following diff to this
>> patch and we are good to go...
>>
>> diff --git a/utils/gssd/gssd_proc.c b/utils/gssd/gssd_proc.c
>> index e651d71..2f9f8ab 100644
>> --- a/utils/gssd/gssd_proc.c
>> +++ b/utils/gssd/gssd_proc.c
>> @@ -437,7 +437,7 @@ change_identity(uid_t uid)
>>         struct passwd   *pw;
>>
>>         /* drop list of supplimentary groups first */
>> -       if (setgroups(0, NULL) != 0) {
>> +       if (syscall(SYS_setgroups, 0) != 0) {
>>                 printerr(0, "WARNING: unable to drop supplimentary groups!");
>>                 return errno;
>>         }
>>
> 
> Do you know why we do this before getting the passwd entry?
It came in with commit 6b53fc9c which changed the way gssd
changed the uid/gid from Jeff Layton...

Jeff, what was the thought behind dropping supplementary groups?
I believe it was some type of security thing.

> 
> Doing as you suggest causes problems as in it it fails to drop the
> supplementary groups.
hmm... what are you seeing that I'm not?

steved.

--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux