Date: Wed, 16 Mar 2016 20:15:25 +0100 From: Mateusz Guzik <mjguzik@gmail.com> To: Simon <freebsd.lists@whitewinterwolf.com> Cc: freebsd-jail@freebsd.org Subject: Re: SHM objects cannot be isolated in jails, any evolution in future FreeBSD versions? Message-ID: <20160316191525.GA4550@dft-labs.eu> In-Reply-To: <c1e2fc0269e9de3a653d6e47da26b026@whitewinterwolf.com> References: <c1e2fc0269e9de3a653d6e47da26b026@whitewinterwolf.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Mar 12, 2016 at 12:05:57PM +0100, Simon wrote: > The shm_open()(2) function changed since FreeBSD 7.0: the SHM objects > path are now uncorrelated from the physical file system to become > just abstract objects. Probably due to this, the jail system do not > provide any form of filtering regarding shared memory created using > this function. Therefore: > > - Anyone can create unauthorized communication channels between jails, > - Users with enough privileges in any jail can access and modify any > SHM objects system-wide, ie. shared memory objects created in any > other jail and in the host system. > > I've seen a few claims that SHM objects were being handled > differently whether they were created inside or outside a jail. > However, I tested on FreeBSD 10.1 and 9.3 but found no evidence of > this: both version were affected by the same issue. > > A reference of such claim: https://lists.freebsd.org/pipermail/freebsd-ports-bugs/2015-July/312665.html > > My initial post on FreeBSD forum discussing the issue with more > details: https://forums.freebsd.org/threads/55468/ > > Currently, there does not seem to be any way to prevent this. > > I'm therefore wondering if there are any concrete plans to change > this situation in future FreeBSD versions? Be able to block the > currently free inter-jail SHM-based communication seems a minimum, > however such setting would also most likely prevent SHM-based > application to work. > > Using file based SHM objects in jails seemed a good ideas but it does > not seem implemented this way, I don't know why. Is this planned, or > are there any greater plans ongoing also involving IPC's similar > issue? > Last time I checked there were no inherent problems preventing getting this to work. A half-assed implementation is trivial and boils down semi-automatically changing several places which reference a global pointer to something taken from struct prison and then adding support to jail(8) and ipcs(1). An acceptable implementation would first take several steps to prevent foot-shooting like e.g. make jail_attach'ing processes singlethreaded. The preferred way would first go over the existing codebase and perform necessary cleanups and bugfixes (if any). Either way, there are no apparent actual problems to be solved here, or in other words this looks like a moderate (option 2) to long time effort (option 3). One unclear bit is involvement with VIMAGE. To be more exact it is quite unclear what's the relationship between VNET and VIMAGE. If one had an entire network stack for their jail, they would not mind separate ipcs either. On the other hand having separate ipcs should not require a separate network stack. As such, does not look like this would duplicate too much effort if VIMAGE was to become usable. That said, this is definitely doable. I can have another look, but no promises. -- Mateusz Guzik <mjguzik gmail.com>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20160316191525.GA4550>