SafeSetID.rst 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118
  1. =========
  2. SafeSetID
  3. =========
  4. SafeSetID is an LSM module that gates the setid family of syscalls to restrict
  5. UID/GID transitions from a given UID/GID to only those approved by a
  6. system-wide allowlist. These restrictions also prohibit the given UIDs/GIDs
  7. from obtaining auxiliary privileges associated with CAP_SET{U/G}ID, such as
  8. allowing a user to set up user namespace UID/GID mappings.
  9. Background
  10. ==========
  11. In absence of file capabilities, processes spawned on a Linux system that need
  12. to switch to a different user must be spawned with CAP_SETUID privileges.
  13. CAP_SETUID is granted to programs running as root or those running as a non-root
  14. user that have been explicitly given the CAP_SETUID runtime capability. It is
  15. often preferable to use Linux runtime capabilities rather than file
  16. capabilities, since using file capabilities to run a program with elevated
  17. privileges opens up possible security holes since any user with access to the
  18. file can exec() that program to gain the elevated privileges.
  19. While it is possible to implement a tree of processes by giving full
  20. CAP_SET{U/G}ID capabilities, this is often at odds with the goals of running a
  21. tree of processes under non-root user(s) in the first place. Specifically,
  22. since CAP_SETUID allows changing to any user on the system, including the root
  23. user, it is an overpowered capability for what is needed in this scenario,
  24. especially since programs often only call setuid() to drop privileges to a
  25. lesser-privileged user -- not elevate privileges. Unfortunately, there is no
  26. generally feasible way in Linux to restrict the potential UIDs that a user can
  27. switch to through setuid() beyond allowing a switch to any user on the system.
  28. This SafeSetID LSM seeks to provide a solution for restricting setid
  29. capabilities in such a way.
  30. The main use case for this LSM is to allow a non-root program to transition to
  31. other untrusted uids without full blown CAP_SETUID capabilities. The non-root
  32. program would still need CAP_SETUID to do any kind of transition, but the
  33. additional restrictions imposed by this LSM would mean it is a "safer" version
  34. of CAP_SETUID since the non-root program cannot take advantage of CAP_SETUID to
  35. do any unapproved actions (e.g. setuid to uid 0 or create/enter new user
  36. namespace). The higher level goal is to allow for uid-based sandboxing of system
  37. services without having to give out CAP_SETUID all over the place just so that
  38. non-root programs can drop to even-lesser-privileged uids. This is especially
  39. relevant when one non-root daemon on the system should be allowed to spawn other
  40. processes as different uids, but its undesirable to give the daemon a
  41. basically-root-equivalent CAP_SETUID.
  42. Other Approaches Considered
  43. ===========================
  44. Solve this problem in userspace
  45. -------------------------------
  46. For candidate applications that would like to have restricted setid capabilities
  47. as implemented in this LSM, an alternative option would be to simply take away
  48. setid capabilities from the application completely and refactor the process
  49. spawning semantics in the application (e.g. by using a privileged helper program
  50. to do process spawning and UID/GID transitions). Unfortunately, there are a
  51. number of semantics around process spawning that would be affected by this, such
  52. as fork() calls where the program doesn't immediately call exec() after the
  53. fork(), parent processes specifying custom environment variables or command line
  54. args for spawned child processes, or inheritance of file handles across a
  55. fork()/exec(). Because of this, as solution that uses a privileged helper in
  56. userspace would likely be less appealing to incorporate into existing projects
  57. that rely on certain process-spawning semantics in Linux.
  58. Use user namespaces
  59. -------------------
  60. Another possible approach would be to run a given process tree in its own user
  61. namespace and give programs in the tree setid capabilities. In this way,
  62. programs in the tree could change to any desired UID/GID in the context of their
  63. own user namespace, and only approved UIDs/GIDs could be mapped back to the
  64. initial system user namespace, affectively preventing privilege escalation.
  65. Unfortunately, it is not generally feasible to use user namespaces in isolation,
  66. without pairing them with other namespace types, which is not always an option.
  67. Linux checks for capabilities based off of the user namespace that "owns" some
  68. entity. For example, Linux has the notion that network namespaces are owned by
  69. the user namespace in which they were created. A consequence of this is that
  70. capability checks for access to a given network namespace are done by checking
  71. whether a task has the given capability in the context of the user namespace
  72. that owns the network namespace -- not necessarily the user namespace under
  73. which the given task runs. Therefore spawning a process in a new user namespace
  74. effectively prevents it from accessing the network namespace owned by the
  75. initial namespace. This is a deal-breaker for any application that expects to
  76. retain the CAP_NET_ADMIN capability for the purpose of adjusting network
  77. configurations. Using user namespaces in isolation causes problems regarding
  78. other system interactions, including use of pid namespaces and device creation.
  79. Use an existing LSM
  80. -------------------
  81. None of the other in-tree LSMs have the capability to gate setid transitions, or
  82. even employ the security_task_fix_setuid hook at all. SELinux says of that hook:
  83. "Since setuid only affects the current process, and since the SELinux controls
  84. are not based on the Linux identity attributes, SELinux does not need to control
  85. this operation."
  86. Directions for use
  87. ==================
  88. This LSM hooks the setid syscalls to make sure transitions are allowed if an
  89. applicable restriction policy is in place. Policies are configured through
  90. securityfs by writing to the safesetid/uid_allowlist_policy and
  91. safesetid/gid_allowlist_policy files at the location where securityfs is
  92. mounted. The format for adding a policy is '<UID>:<UID>' or '<GID>:<GID>',
  93. using literal numbers, and ending with a newline character such as '123:456\n'.
  94. Writing an empty string "" will flush the policy. Again, configuring a policy
  95. for a UID/GID will prevent that UID/GID from obtaining auxiliary setid
  96. privileges, such as allowing a user to set up user namespace UID/GID mappings.
  97. Note on GID policies and setgroups()
  98. ====================================
  99. In v5.9 we are adding support for limiting CAP_SETGID privileges as was done
  100. previously for CAP_SETUID. However, for compatibility with common sandboxing
  101. related code conventions in userspace, we currently allow arbitrary
  102. setgroups() calls for processes with CAP_SETGID restrictions. Until we add
  103. support in a future release for restricting setgroups() calls, these GID
  104. policies add no meaningful security. setgroups() restrictions will be enforced
  105. once we have the policy checking code in place, which will rely on GID policy
  106. configuration code added in v5.9.