On 01/12/2018 10:57 AM, Daniel Walsh wrote:
> On 01/12/2018 10:41 AM, Steve Dickson wrote:
>>
>> On 01/12/2018 09:47 AM, Lennart Poettering wrote:
>>> On Fr, 12.01.18 09:28, Steve Dickson (ste...@redhat.com) wrote:
>>>
>>>>> User namespacing is a Linux kernel feature. It's most well known
>>>>> consumers are probably Docker, and maybe flatpak/bubblewrap and LXC.
>>>> Well know for how long?
>>> The commit adding user namespaces to the Linux kernel was in 2007. 11
>>> years ago, in kernel 2.6.23.
>> Wow... we've been living this way a long time... Seemly without any problems?
>> If that is the case then I really don't see a need for this change
>> that could potentially cause such havoc.
> Having this in the kernel and actually anyone using it are two different 
> things.  We are just beginning to finally use this now.
Ah... this explains the exposure of nfsnobody... 

So if its just beginning to be used... we can change the defaults... right? :-) 

>>  
>>>>> It's not systemd that came up with reusing 65534 for user
>>>>> namespacing. It's kernel people:
>>>>>
>>>>>          $ cat /proc/sys/kernel/overflowuid
>>>>>          65534
>>>> How was that number chosen and why can't be changed?
>>> It's conceptually the same thing: it's where UIDs are mapped that
>>> cannot be mapped properly otherwise.
>> Right... I'm assuming this overflow almost never happens
>> from looking at the code.
> Well in UserNamespace it happens all the time.  Basically any Inode that is 
> owned by a uid that is not mapped in the usernamespace will be reported as 
> this UID.
Ok... understood.

>>> In theory you can change it by echoing something into sysctl, but
>>> that's mostly theoretic, and not what the various consumers of userns
>>> do.
>> Understood.
>>
>>> And regardless, it's conceptually the same thing anyway, so it makes a
>>> ton of sense to use the UID there for both NFS and userns
>>> purposes. While I have my reservations about userns in general the
>>> logic behind using that UID for this purpose is very clear to me and
>>> makes sense as far as I can see.
>>>
>> So the problem trying to be solved is when the overflow uid/gid
>> are used (which is rarely), the owner of the file become
>> nfsnobody which does not make any sense because it is on a local filesystem.
> It is not rare.
>> If this is the case, my I suggest that since the overflow uid/gid is
>> basically an arbitrary value and easily changeable... Why not
>> have some boot process echo '99' into /proc/sys/kernel/overflowuid
>> which would match nicely to a uid/gid of a user named 'nobody'?
> You would force everyone everwhere to make this change.
If I'm understanding your question... Yes this would be a fedora-only 
thing... but so what? We have a lot of Fedora only things.

Side Note: I have a ping out to a SUSE guy to see how they handle this
but the guy lives on the other side of the earth so I probably
will not get a response until tomorrow.

steved.
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org

Reply via email to