ksummit.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: James Bottomley <James.Bottomley@HansenPartnership.com>
To: David Howells <dhowells@redhat.com>,
	ksummit-discuss@lists.linuxfoundation.org
Cc: ikent@redhat.com,
	Linux Containers <containers@lists.linux-foundation.org>,
	oleg@redhat.com
Subject: Re: [Ksummit-discuss] [TECH TOPIC] Containerisation, namespaces and keyrings
Date: Fri, 22 Jul 2016 07:51:05 -0700	[thread overview]
Message-ID: <1469199065.2382.21.camel@HansenPartnership.com> (raw)
In-Reply-To: <15842.1469185302@warthog.procyon.org.uk>

On Fri, 2016-07-22 at 12:01 +0100, David Howells wrote:
> I'm not sure this is the right venue for this, but keyrings will need 
> to be namespaced/containerised at some point.

There are various unvirtualised subsystems within Linux.  There has
been discussion on the containers mailing list about how:

http://thread.gmane.org/gmane.linux.kernel.containers/30371

So far Eric has advocated for making things like this properties of the
user namespace; I'm more inclined to a separate namespace for
delegates, but nothing's been decided.

Proposing on the containers list should be your first step (I've added
the list to the cc).

> The problem is that it's an icky problem given that different key 
> types really want to live in different namespaces, and upcalls may 
> want to done in different containers, depending on the key type.

Surely if you virtualize, you'll have a namespace label per key (or
keyring) so they'll be in one and only one namespace.

The upcall problem sounds like it might be similar to the nfsd one,
which is nasty.  Describing it on the list would help people
understand.

> For example, DNS resolver keys - should they be in the network, the 
> filesystem namespace or neither?  Should the upcall be in the current 
> container or the root container?

Depends what the upcall does.

> Authentication keys, such as used by kafs and AF_RXRPC - should they 
> be in the filesystem namespace (kafs is an fs), the network namespace 
> (AF_RXRPC is a net protocol) or the user namespace?

I'm sort of starting to see Eric's point now, since every namespace has
an owning user namespace, if they were in that the question is
naturally answered.

> Should crypto keys, such as the asymmetric key type, be in the user 
> namespace? What about use by module signing?  Should key operations 
> in the current container have access to a blacklist in the root 
> container?  Should key verification in the current container have 
> access to system keyrings?   The TPM?
> 
> This might actually be right for a hallway track.

Actually, I really think this isn't a KS issue, it should be proposed
for the Plumbers Containers MC:

http://www.linuxplumbersconf.org/2016/ocw/events/LPC2016/tracks/519

You have all the correct people in that session.  At KS you'll have 50%
bored, 48% hostile because they hate cgroups and 2% interested.

James

  parent reply	other threads:[~2016-07-22 14:51 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-07-22 11:01 David Howells
2016-07-22 13:29 ` Rik van Riel
2016-07-22 14:51 ` James Bottomley [this message]
2016-07-26 13:30   ` Serge E. Hallyn
2016-07-26 13:38   ` Laurent Pinchart
2016-07-26 14:16     ` James Bottomley
2016-07-27 19:47 ` Mimi Zohar
2016-07-30 17:50 ` Eric W. Biederman

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1469199065.2382.21.camel@HansenPartnership.com \
    --to=james.bottomley@hansenpartnership.com \
    --cc=containers@lists.linux-foundation.org \
    --cc=dhowells@redhat.com \
    --cc=ikent@redhat.com \
    --cc=ksummit-discuss@lists.linuxfoundation.org \
    --cc=oleg@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox