From: Alyssa Ross <hi@alyssa.is>
To: Demi Marie Obenour <demiobenour@gmail.com>
Cc: Spectrum OS Development <devel@spectrum-os.org>
Subject: Re: Sandboxing strategy
Date: Fri, 19 Sep 2025 15:17:38 +0200 [thread overview]
Message-ID: <87qzw2shsd.fsf@alyssa.is> (raw)
In-Reply-To: <88e28fdf-2d77-429f-8b4f-8cef4a997ed7@gmail.com>
[-- Attachment #1: Type: text/plain, Size: 2511 bytes --]
Demi Marie Obenour <demiobenour@gmail.com> writes:
> On 9/17/25 07:27, Alyssa Ross wrote:
>> Demi Marie Obenour <demiobenour@gmail.com> writes:
>>
>>> On 9/10/25 11:11, Alyssa Ross wrote:
>>>> • These services are part of our TCB anyway. Sandboxing only gets us
>>>> defense in depth. With that in mind, it's basically never going to
>>>> be worth adding sandboxing if it adds any amount of attack surface.
>>>> One example of that would be user namespaces. They've been a
>>>> consistent source of kernel security issues, and it might be better
>>>> to turn them off entirely than to use them for sandboxing stuff
>>>> that's trusted anyway.
>>>
>>> Sandboxing virtiofsd is going to be really annoying and will definitely
>>> come at a performance cost. The most efficient way to use virtiofsd
>>> is to give it CAP_DAC_READ_SEARCH in the initial user namespace and
>>> delegate _all_ access control to it. This allows virtiofs to use
>>> open_by_handle_at() for all filesystem access. Unfortunately,
>>> this also allows virtiofsd to open any file on the filesystem, ignoring
>>> all discretionary access control checks. I don't think Landlock would
>>> work either. SELinux or SMACK might work, but using them is
>>> significantly more complicated.
>>>
>>> If one wants to sandbox virtiofsd, one either needs to
>>> use --cache=never or run into an effective resource leak
>>> (https://gitlab.com/virtio-fs/virtiofsd/-/issues/194).
>>> My hope is that in the future the problem will be solved
>>> by DAX and an in-kernel shrinker that is aware of the host
>>> resources it is using. Denial of service would be prevented
>>> by cgroups on the host, addressing the objection mentioned
>>> in the issue comments.
>>
>> Do we not trust virtiofsd's built-in sandboxing?
>
> I do trust it, provided that it is verifiable (by dumping the state
> of the process at runtime). However, allowing unrestricted
> open_by_handle_at() allows opening any file on the system, conditioned
> only on the filesystem supporting open_by_handle_at(). Therefore,
> sandboxing and using handles for all filesystem access are incompatible.
Wouldn't it be limited to only files on the same filesystem, since you
have to pass a mount FD to open_by_handle_at()?
That's still bad though. So then to start with we just want to make
sure it doesn't have CAP_DAC_READ_SEARCH, and then we hope that
something comes along to address the limitations of that?
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 227 bytes --]
next prev parent reply other threads:[~2025-09-19 13:18 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-09-09 7:57 Sandboxing strategy Demi Marie Obenour
2025-09-10 15:11 ` Alyssa Ross
2025-09-10 15:14 ` Alyssa Ross
2025-09-10 20:35 ` Demi Marie Obenour
2025-09-17 11:27 ` Alyssa Ross
2025-09-18 2:34 ` Demi Marie Obenour
2025-09-19 13:17 ` Alyssa Ross [this message]
2025-09-19 19:37 ` Demi Marie Obenour
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87qzw2shsd.fsf@alyssa.is \
--to=hi@alyssa.is \
--cc=demiobenour@gmail.com \
--cc=devel@spectrum-os.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://spectrum-os.org/git/crosvm
https://spectrum-os.org/git/doc
https://spectrum-os.org/git/mktuntap
https://spectrum-os.org/git/nixpkgs
https://spectrum-os.org/git/spectrum
https://spectrum-os.org/git/ucspi-vsock
https://spectrum-os.org/git/www
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).