Message ID | 20230419-upstream-lsm-next-20230419-mptcp-sublows-user-ctx-v2-0-e7a3c8c15676@tessares.net (mailing list archive) |
---|---|
Headers | show |
Series | security: SELinux/LSM label with MPTCP and accept | expand |
On Thu, Apr 20, 2023 at 7:17 PM Matthieu Baerts <matthieu.baerts@tessares.net> wrote: > > In [1], Ondrej Mosnacek explained they discovered the (userspace-facing) > sockets returned by accept(2) when using MPTCP always end up with the > label representing the kernel (typically system_u:system_r:kernel_t:s0), > while it would make more sense to inherit the context from the parent > socket (the one that is passed to accept(2)). Thanks to the > participation of Paul Moore in the discussions, modifications on MPTCP > side have started and the result is available here. > > Paolo Abeni worked hard to refactor the initialisation of the first > subflow of a listen socket. The first subflow allocation is no longer > done at the initialisation of the socket but later, when the connection > request is received or when requested by the userspace. This was a > prerequisite to proper support of SELinux/LSM labels with MPTCP and > accept. The last batch containing the commit ddb1a072f858 ("mptcp: move > first subflow allocation at mpc access time") [2] has been recently > accepted and applied in netdev/net-next repo [3]. > > This series of 2 patches is based on top of the lsm/next branch. Despite > the fact they depend on commits that are in netdev/net-next repo to > support the new feature, they can be applied in lsm/next without > creating conflicts with net-next or causing build issues. These two > patches on top of lsm/next still passes all the MPTCP-specific tests. > The only thing is that the new feature only works properly with the > patches that are on netdev/net-next. The tests with the new labels have > been done on top of them. > > Regarding the two patches, the first one introduces a new LSM hook > called from MPTCP side when creating a new subflow socket. This hook > allows the security module to relabel the subflow according to the owing > process. The second one implements this new hook on the SELinux side. > > Link: https://lore.kernel.org/netdev/CAFqZXNs2LF-OoQBUiiSEyranJUXkPLcCfBkMkwFeM6qEwMKCTw@mail.gmail.com/ [1] > Link: https://git.kernel.org/netdev/net-next/c/ddb1a072f858 [2] > Link: https://lore.kernel.org/netdev/20230414-upstream-net-next-20230414-mptcp-refactor-first-subflow-init-v1-0-04d177057eb9@tessares.net/ [3] > Signed-off-by: Matthieu Baerts <matthieu.baerts@tessares.net> > --- > Changes in v2: > - Address Paul's comments, see the notes on each patch > - Link to v1: https://lore.kernel.org/r/20230419-upstream-lsm-next-20230419-mptcp-sublows-user-ctx-v1-0-9d4064cb0075@tessares.net > > --- > Paolo Abeni (2): > security, lsm: Introduce security_mptcp_add_subflow() > selinux: Implement mptcp_add_subflow hook > > include/linux/lsm_hook_defs.h | 1 + > include/linux/security.h | 6 ++++++ > net/mptcp/subflow.c | 6 ++++++ > security/security.c | 17 +++++++++++++++++ > security/selinux/hooks.c | 16 ++++++++++++++++ > security/selinux/netlabel.c | 8 ++++++-- > 6 files changed, 52 insertions(+), 2 deletions(-) > --- > base-commit: d82dcd9e21b77d338dc4875f3d4111f0db314a7c > change-id: 20230419-upstream-lsm-next-20230419-mptcp-sublows-user-ctx-eee658fafcba > > Best regards, > -- > Matthieu Baerts <matthieu.baerts@tessares.net> > I haven't yet looked closer at the code in this series, but I can at least confirm that with the series (applied on top of net-next) the selinux-testsuite now passes when run under mptcpize, with one caveat: The "client" test prog in the inet_socket subtest sets the SO_SNDTIMEO socket option on the client socket, but the subtest takes significantly longer to complete than when run without mptcpize. That suggests to me that there is possibly some (pre-existing) issue with MPTCP where the send/receive timeouts are not being passed to the subflow socket(s), leading to a longer wait (I guess the default is higher?) when the timeout is expected to be hit (there are test cases where we expect packets to be dropped due to SELinux access controls, which we detect via timeout). I'm only taking a wild guess at the root cause here, but I hope you guys will be able to figure it out and fix whatever needs fixing :) -- Ondrej Mosnacek Senior Software Engineer, Linux Security - SELinux kernel Red Hat, Inc.
On Thu, 2023-05-04 at 16:14 +0200, Ondrej Mosnacek wrote: > On Thu, Apr 20, 2023 at 7:17 PM Matthieu Baerts > <matthieu.baerts@tessares.net> wrote: > > > > In [1], Ondrej Mosnacek explained they discovered the (userspace-facing) > > sockets returned by accept(2) when using MPTCP always end up with the > > label representing the kernel (typically system_u:system_r:kernel_t:s0), > > while it would make more sense to inherit the context from the parent > > socket (the one that is passed to accept(2)). Thanks to the > > participation of Paul Moore in the discussions, modifications on MPTCP > > side have started and the result is available here. > > > > Paolo Abeni worked hard to refactor the initialisation of the first > > subflow of a listen socket. The first subflow allocation is no longer > > done at the initialisation of the socket but later, when the connection > > request is received or when requested by the userspace. This was a > > prerequisite to proper support of SELinux/LSM labels with MPTCP and > > accept. The last batch containing the commit ddb1a072f858 ("mptcp: move > > first subflow allocation at mpc access time") [2] has been recently > > accepted and applied in netdev/net-next repo [3]. > > > > This series of 2 patches is based on top of the lsm/next branch. Despite > > the fact they depend on commits that are in netdev/net-next repo to > > support the new feature, they can be applied in lsm/next without > > creating conflicts with net-next or causing build issues. These two > > patches on top of lsm/next still passes all the MPTCP-specific tests. > > The only thing is that the new feature only works properly with the > > patches that are on netdev/net-next. The tests with the new labels have > > been done on top of them. > > > > Regarding the two patches, the first one introduces a new LSM hook > > called from MPTCP side when creating a new subflow socket. This hook > > allows the security module to relabel the subflow according to the owing > > process. The second one implements this new hook on the SELinux side. > > > > Link: https://lore.kernel.org/netdev/CAFqZXNs2LF-OoQBUiiSEyranJUXkPLcCfBkMkwFeM6qEwMKCTw@mail.gmail.com/ [1] > > Link: https://git.kernel.org/netdev/net-next/c/ddb1a072f858 [2] > > Link: https://lore.kernel.org/netdev/20230414-upstream-net-next-20230414-mptcp-refactor-first-subflow-init-v1-0-04d177057eb9@tessares.net/ [3] > > Signed-off-by: Matthieu Baerts <matthieu.baerts@tessares.net> > > --- > > Changes in v2: > > - Address Paul's comments, see the notes on each patch > > - Link to v1: https://lore.kernel.org/r/20230419-upstream-lsm-next-20230419-mptcp-sublows-user-ctx-v1-0-9d4064cb0075@tessares.net > > > > --- > > Paolo Abeni (2): > > security, lsm: Introduce security_mptcp_add_subflow() > > selinux: Implement mptcp_add_subflow hook > > > > include/linux/lsm_hook_defs.h | 1 + > > include/linux/security.h | 6 ++++++ > > net/mptcp/subflow.c | 6 ++++++ > > security/security.c | 17 +++++++++++++++++ > > security/selinux/hooks.c | 16 ++++++++++++++++ > > security/selinux/netlabel.c | 8 ++++++-- > > 6 files changed, 52 insertions(+), 2 deletions(-) > > --- > > base-commit: d82dcd9e21b77d338dc4875f3d4111f0db314a7c > > change-id: 20230419-upstream-lsm-next-20230419-mptcp-sublows-user-ctx-eee658fafcba > > > > Best regards, > > -- > > Matthieu Baerts <matthieu.baerts@tessares.net> > > > > I haven't yet looked closer at the code in this series, but I can at > least confirm that with the series (applied on top of net-next) the > selinux-testsuite now passes when run under mptcpize, with one caveat: > > The "client" test prog in the inet_socket subtest sets the SO_SNDTIMEO > socket option on the client socket, but the subtest takes > significantly longer to complete than when run without mptcpize. That > suggests to me that there is possibly some (pre-existing) issue with > MPTCP where the send/receive timeouts are not being passed to the > subflow socket(s), leading to a longer wait (I guess the default is > higher?) Indeed the behavior you describe is due to some mptcp bug in handling the SO_{SND,RCV}TIMEO socket tions, and it's really unrelated to the initially reported selinux issue. If you could file an issue on our tracker, that would help ;) Thanks! Paolo
On Thu, May 4, 2023 at 6:13 PM Paolo Abeni <pabeni@redhat.com> wrote: > On Thu, 2023-05-04 at 16:14 +0200, Ondrej Mosnacek wrote: > > On Thu, Apr 20, 2023 at 7:17 PM Matthieu Baerts > > <matthieu.baerts@tessares.net> wrote: > > > > > > In [1], Ondrej Mosnacek explained they discovered the (userspace-facing) > > > sockets returned by accept(2) when using MPTCP always end up with the > > > label representing the kernel (typically system_u:system_r:kernel_t:s0), > > > while it would make more sense to inherit the context from the parent > > > socket (the one that is passed to accept(2)). Thanks to the > > > participation of Paul Moore in the discussions, modifications on MPTCP > > > side have started and the result is available here. > > > > > > Paolo Abeni worked hard to refactor the initialisation of the first > > > subflow of a listen socket. The first subflow allocation is no longer > > > done at the initialisation of the socket but later, when the connection > > > request is received or when requested by the userspace. This was a > > > prerequisite to proper support of SELinux/LSM labels with MPTCP and > > > accept. The last batch containing the commit ddb1a072f858 ("mptcp: move > > > first subflow allocation at mpc access time") [2] has been recently > > > accepted and applied in netdev/net-next repo [3]. > > > > > > This series of 2 patches is based on top of the lsm/next branch. Despite > > > the fact they depend on commits that are in netdev/net-next repo to > > > support the new feature, they can be applied in lsm/next without > > > creating conflicts with net-next or causing build issues. These two > > > patches on top of lsm/next still passes all the MPTCP-specific tests. > > > The only thing is that the new feature only works properly with the > > > patches that are on netdev/net-next. The tests with the new labels have > > > been done on top of them. > > > > > > Regarding the two patches, the first one introduces a new LSM hook > > > called from MPTCP side when creating a new subflow socket. This hook > > > allows the security module to relabel the subflow according to the owing > > > process. The second one implements this new hook on the SELinux side. > > > > > > Link: https://lore.kernel.org/netdev/CAFqZXNs2LF-OoQBUiiSEyranJUXkPLcCfBkMkwFeM6qEwMKCTw@mail.gmail.com/ [1] > > > Link: https://git.kernel.org/netdev/net-next/c/ddb1a072f858 [2] > > > Link: https://lore.kernel.org/netdev/20230414-upstream-net-next-20230414-mptcp-refactor-first-subflow-init-v1-0-04d177057eb9@tessares.net/ [3] > > > Signed-off-by: Matthieu Baerts <matthieu.baerts@tessares.net> > > > --- > > > Changes in v2: > > > - Address Paul's comments, see the notes on each patch > > > - Link to v1: https://lore.kernel.org/r/20230419-upstream-lsm-next-20230419-mptcp-sublows-user-ctx-v1-0-9d4064cb0075@tessares.net > > > > > > --- > > > Paolo Abeni (2): > > > security, lsm: Introduce security_mptcp_add_subflow() > > > selinux: Implement mptcp_add_subflow hook > > > > > > include/linux/lsm_hook_defs.h | 1 + > > > include/linux/security.h | 6 ++++++ > > > net/mptcp/subflow.c | 6 ++++++ > > > security/security.c | 17 +++++++++++++++++ > > > security/selinux/hooks.c | 16 ++++++++++++++++ > > > security/selinux/netlabel.c | 8 ++++++-- > > > 6 files changed, 52 insertions(+), 2 deletions(-) > > > --- > > > base-commit: d82dcd9e21b77d338dc4875f3d4111f0db314a7c > > > change-id: 20230419-upstream-lsm-next-20230419-mptcp-sublows-user-ctx-eee658fafcba > > > > > > Best regards, > > > -- > > > Matthieu Baerts <matthieu.baerts@tessares.net> > > > > > > > I haven't yet looked closer at the code in this series, but I can at > > least confirm that with the series (applied on top of net-next) the > > selinux-testsuite now passes when run under mptcpize, with one caveat: > > > > The "client" test prog in the inet_socket subtest sets the SO_SNDTIMEO > > socket option on the client socket, but the subtest takes > > significantly longer to complete than when run without mptcpize. That > > suggests to me that there is possibly some (pre-existing) issue with > > MPTCP where the send/receive timeouts are not being passed to the > > subflow socket(s), leading to a longer wait (I guess the default is > > higher?) > > Indeed the behavior you describe is due to some mptcp bug in handling > the SO_{SND,RCV}TIMEO socket tions, and it's really unrelated to the > initially reported selinux issue. Definitely unrelated, just wanted to report the bug :) > If you could file an issue on our tracker, that would help ;) I was about to ask where that tracker is, but then it occured to me to check MAINTAINERS and the link is right there, so yes, will do :) -- Ondrej Mosnacek Senior Software Engineer, Linux Security - SELinux kernel Red Hat, Inc.
In [1], Ondrej Mosnacek explained they discovered the (userspace-facing) sockets returned by accept(2) when using MPTCP always end up with the label representing the kernel (typically system_u:system_r:kernel_t:s0), while it would make more sense to inherit the context from the parent socket (the one that is passed to accept(2)). Thanks to the participation of Paul Moore in the discussions, modifications on MPTCP side have started and the result is available here. Paolo Abeni worked hard to refactor the initialisation of the first subflow of a listen socket. The first subflow allocation is no longer done at the initialisation of the socket but later, when the connection request is received or when requested by the userspace. This was a prerequisite to proper support of SELinux/LSM labels with MPTCP and accept. The last batch containing the commit ddb1a072f858 ("mptcp: move first subflow allocation at mpc access time") [2] has been recently accepted and applied in netdev/net-next repo [3]. This series of 2 patches is based on top of the lsm/next branch. Despite the fact they depend on commits that are in netdev/net-next repo to support the new feature, they can be applied in lsm/next without creating conflicts with net-next or causing build issues. These two patches on top of lsm/next still passes all the MPTCP-specific tests. The only thing is that the new feature only works properly with the patches that are on netdev/net-next. The tests with the new labels have been done on top of them. Regarding the two patches, the first one introduces a new LSM hook called from MPTCP side when creating a new subflow socket. This hook allows the security module to relabel the subflow according to the owing process. The second one implements this new hook on the SELinux side. Link: https://lore.kernel.org/netdev/CAFqZXNs2LF-OoQBUiiSEyranJUXkPLcCfBkMkwFeM6qEwMKCTw@mail.gmail.com/ [1] Link: https://git.kernel.org/netdev/net-next/c/ddb1a072f858 [2] Link: https://lore.kernel.org/netdev/20230414-upstream-net-next-20230414-mptcp-refactor-first-subflow-init-v1-0-04d177057eb9@tessares.net/ [3] Signed-off-by: Matthieu Baerts <matthieu.baerts@tessares.net> --- Changes in v2: - Address Paul's comments, see the notes on each patch - Link to v1: https://lore.kernel.org/r/20230419-upstream-lsm-next-20230419-mptcp-sublows-user-ctx-v1-0-9d4064cb0075@tessares.net --- Paolo Abeni (2): security, lsm: Introduce security_mptcp_add_subflow() selinux: Implement mptcp_add_subflow hook include/linux/lsm_hook_defs.h | 1 + include/linux/security.h | 6 ++++++ net/mptcp/subflow.c | 6 ++++++ security/security.c | 17 +++++++++++++++++ security/selinux/hooks.c | 16 ++++++++++++++++ security/selinux/netlabel.c | 8 ++++++-- 6 files changed, 52 insertions(+), 2 deletions(-) --- base-commit: d82dcd9e21b77d338dc4875f3d4111f0db314a7c change-id: 20230419-upstream-lsm-next-20230419-mptcp-sublows-user-ctx-eee658fafcba Best regards,