On Thu, Jun 22, 2023 at 9:50 AM Mickaël Salaün <mic@xxxxxxxxxxx> wrote: > > > On 13/06/2023 22:12, Mickaël Salaün wrote: > > > > On 13/06/2023 12:13, Konstantin Meskhidze (A) wrote: > >> > >> > >> 6/7/2023 8:46 AM, Jeff Xu пишет: > >>> On Tue, Jun 6, 2023 at 7:09 AM Günther Noack <gnoack@xxxxxxxxxx> wrote: > >>>> > >>>> On Tue, May 16, 2023 at 12:13:39AM +0800, Konstantin Meskhidze wrote: > >>>>> Describe network access rules for TCP sockets. Add network access > >>>>> example in the tutorial. Add kernel configuration support for network. > >>>>> > >>>>> Signed-off-by: Konstantin Meskhidze <konstantin.meskhidze@xxxxxxxxxx> > > [...] > > >>>>> @@ -28,20 +28,24 @@ appropriately <kernel_support>`. > >>>>> Landlock rules > >>>>> ============== > >>>>> > >>>>> -A Landlock rule describes an action on an object. An object is currently a > >>>>> -file hierarchy, and the related filesystem actions are defined with `access > >>>>> -rights`_. A set of rules is aggregated in a ruleset, which can then restrict > >>>>> -the thread enforcing it, and its future children. > >>>>> +A Landlock rule describes an action on a kernel object. Filesystem > >>>>> +objects can be defined with a file hierarchy. Since the fourth ABI > >>>>> +version, TCP ports enable to identify inbound or outbound connections. > >>>>> +Actions on these kernel objects are defined according to `access > >>>>> +rights`_. A set of rules is aggregated in a ruleset, which > >>>>> +can then restrict the thread enforcing it, and its future children. > >>>> > >>>> I feel that this paragraph is a bit long-winded to read when the > >>>> additional networking aspect is added on top as well. Maybe it would > >>>> be clearer if we spelled it out in a more structured way, splitting up > >>>> the filesystem/networking aspects? > >>>> > >>>> Suggestion: > >>>> > >>>> A Landlock rule describes an action on an object which the process > >>>> intends to perform. A set of rules is aggregated in a ruleset, > >>>> which can then restrict the thread enforcing it, and its future > >>>> children. > >>>> > >>>> The two existing types of rules are: > >>>> > >>>> Filesystem rules > >>>> For these rules, the object is a file hierarchy, > >>>> and the related filesystem actions are defined with > >>>> `filesystem access rights`. > >>>> > >>>> Network rules (since ABI v4) > >>>> For these rules, the object is currently a TCP port, > >>> Remote port or local port ? > >>> > >> Both ports - remote or local. > > > > Hmm, at first I didn't think it was worth talking about remote or local, > > but I now think it could be less confusing to specify a bit: > > "For these rules, the object is the socket identified with a TCP (bind > > or connect) port according to the related `network access rights`." > > > > A port is not a kernel object per see, so I tried to tweak a bit the > > sentence. I'm not sure such detail (object vs. data) would not confuse > > users. Any thought? > > Well, here is a more accurate and generic definition (using "scope"): > > A Landlock rule describes a set of actions intended by a task on a scope > of objects. A set of rules is aggregated in a ruleset, which can then > restrict the thread enforcing it, and its future children. > > The two existing types of rules are: > > Filesystem rules > For these rules, the scope of objects is a file hierarchy, > and the related filesystem actions are defined with > `filesystem access rights`. > > Network rules (since ABI v4) > For these rules, the scope of objects is the sockets identified > with a TCP (bind or connect) port according to the related > `network access rights`. > > > What do you think? > I found this is clearer to me (mention of bind/connect port). In networking, "5-tuple" is a well-known term for connection, which is src/dest ip, src/dest port, protocol. That is why I asked about src/dest port. It seems that we only support src/dest port at this moment, right ? Another feature we could consider is restricting a process to "no network access, allow out-going , allow incoming", this might overlap with seccomp, but I think it is convenient to have it in Landlock. Adding protocol restriction is a low hanging fruit also, for example, a process might be restricted to UDP only (for RTP packet), and another process for TCP (for signaling) , etc. Thanks! -Jeff Xu > > >>> > >>>> and the related actions are defined with `network access rights`.