* bug#73166: shell-autorized-directories
@ 2024-09-10 11:31 Nicolas Graves
2024-09-11 9:52 ` Ludovic Courtès
2024-11-09 21:33 ` bug#73166: [PATCH] shell: Rewrite authorized directories management Nicolas Graves
0 siblings, 2 replies; 15+ messages in thread
From: Nicolas Graves @ 2024-09-10 11:31 UTC (permalink / raw)
To: 73166
According to current uses of the XDG base dirs specification, I think
guix shell-autorized-directories is in the wrong place, and should
instead be in $XDG_STATE_HOME/guix/
direnv uses $XDG_STATE_HOME too to store authorized directories, and it
also makes more sense in the context of immutable configs
WDYT? Should we implement this change? The tricky thing might be the
migration for those files. Maybe we should also add a --allow argument
to guix shell to make it easier to add files.
--
Best regards,
Nicolas Graves
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-09-10 11:31 bug#73166: shell-autorized-directories Nicolas Graves
@ 2024-09-11 9:52 ` Ludovic Courtès
2024-09-11 14:11 ` Nicolas Graves
2024-11-09 21:33 ` bug#73166: [PATCH] shell: Rewrite authorized directories management Nicolas Graves
1 sibling, 1 reply; 15+ messages in thread
From: Ludovic Courtès @ 2024-09-11 9:52 UTC (permalink / raw)
To: Nicolas Graves; +Cc: 73166
Hi,
Nicolas Graves <ngraves@ngraves.fr> skribis:
> According to current uses of the XDG base dirs specification, I think
> guix shell-autorized-directories is in the wrong place, and should
> instead be in $XDG_STATE_HOME/guix/
>
> direnv uses $XDG_STATE_HOME too to store authorized directories, and it
> also makes more sense in the context of immutable configs
Is it that clear-cut? It can be viewed as config rather than state too,
no?
> WDYT? Should we implement this change? The tricky thing might be the
> migration for those files.
Right, migration in itself is difficult. Not to mention that we’d have
to account for people who use ‘time-machine’ to run a pre-migration
shell.
> Maybe we should also add a --allow argument to guix shell to make it
> easier to add files.
That option would add a line to ‘shell-autorized-directories’?
Thanks,
Ludo’.
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-09-11 9:52 ` Ludovic Courtès
@ 2024-09-11 14:11 ` Nicolas Graves
2024-11-09 14:12 ` Nicolas Graves
0 siblings, 1 reply; 15+ messages in thread
From: Nicolas Graves @ 2024-09-11 14:11 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: 73166
On 2024-09-11 11:52, Ludovic Courtès wrote:
> Hi,
>
> Nicolas Graves <ngraves@ngraves.fr> skribis:
>
> Is it that clear-cut? It can be viewed as config rather than state too,
> no?
Possibly, though I'm not sure which use-case will make more sense using
this file as config rather than state.
In my use-case I tried to have an as-much-as-possible immutable home
config, and since I don't think it makes sense to run a guix home
reconfiguration after `echo X > ~/wherever/guix-shell-authorized-directories`,
I had to make a uggly trick/exception for this file.
>
>> WDYT? Should we implement this change? The tricky thing might be the
>> migration for those files.
>
> Right, migration in itself is difficult. Not to mention that we’d have
> to account for people who use ‘time-machine’ to run a pre-migration
> shell.
Question is, is that worth it ? Probably not for only file relocation,
but I now think we need more, see next answer.
>
>> Maybe we should also add a --allow argument to guix shell to make it
>> easier to add files.
>
> That option would add a line to ‘shell-autorized-directories’?
Yes. Actually I would like to develop a little more after thinking about
that.
Let's say you git pull code from a guix-shell-authorized repo and the
pull includes some potentially harmful / dangerous code.
The assumption of direnv is that the user has to allow the code to run
again in this case, putting more emphasis on security. This is not the
case in Guix, IIRC. I think it should be done in Guix too.
Implementing that kind of additional security will indeed need such an
option, for this will need to actually include the hash of the file of
something like that.
It's actually quite simple in direnv, they take a sha256 hash of the
absolute filename + the content of the file.
(See
https://github.com/nicolas-graves/python-direnv/blob/f8f0967a9772f0775ffe75a68d868c75076f5af4/direnv.py#L36)
That hash makes a simple file-based database where a file is allowed based
not only on its location but on its location+content.
We could have two options to interact with such a database :
--allow
--revoke
>
> Thanks,
> Ludo’.
--
Best regards,
Nicolas Graves
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-09-11 14:11 ` Nicolas Graves
@ 2024-11-09 14:12 ` Nicolas Graves
2024-11-10 9:58 ` Saku Laesvuori via Bug reports for GNU Guix
0 siblings, 1 reply; 15+ messages in thread
From: Nicolas Graves @ 2024-11-09 14:12 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: 73166, Andrew Tropin
On 2024-09-11 16:11, Nicolas Graves wrote:
>> That option would add a line to ‘shell-autorized-directories’?
>
> Yes. Actually I would like to develop a little more after thinking about
> that.
>
> Let's say you git pull code from a guix-shell-authorized repo and the
> pull includes some potentially harmful / dangerous code.
>
> The assumption of direnv is that the user has to allow the code to run
> again in this case, putting more emphasis on security. This is not the
> case in Guix, IIRC. I think it should be done in Guix too.
>
> Implementing that kind of additional security will indeed need such an
> option, for this will need to actually include the hash of the file of
> something like that.
>
> It's actually quite simple in direnv, they take a sha256 hash of the
> absolute filename + the content of the file.
> (See
> https://github.com/nicolas-graves/python-direnv/blob/f8f0967a9772f0775ffe75a68d868c75076f5af4/direnv.py#L36)
> That hash makes a simple file-based database where a file is allowed based
> not only on its location but on its location+content.
>
> We could have two options to interact with such a database :
> --allow
> --revoke
Here's a working draft for some code for that. This is currently able
to properly allow or deny my direnv-validated directories. With a
proper direnv rename, we can almost already replace
authorized-shell-directory? function.
I feel like this is a far more secure and convenient way to manage
autorized-directories for guix shell. WDYT ?
@Andrew you might also be interested in that given your focus on
per-directory complete dev environments. Originally I thought of this
while thinking about how unsecure patch 3 of
https://lists.sr.ht/~abcdw/rde-devel/patches/54944 was.
I'll probably continue to work on that to bring it to a full reviewable
patch, some input would be greatly appreciated in the meantime!
(use-modules
(gcrypt hash)
(guix rpm) ; for bytevector->hex-string
(guix serialization)
(srfi srfi-1)
(srfi srfi-11)
(srfi srfi-26)
(srfi srfi-71)
(ice-9 match)
(ice-9 textual-ports))
(define (direnv-file-hash path)
(let* ((abs-path (canonicalize-path path))
(content (call-with-input-file abs-path get-string-all)))
(call-with-input-string (string-append abs-path "\n" content)
(cut (compose bytevector->hex-string port-sha256) <>))))
(define (xdg-data-home)
(or (getenv "XDG_DATA_HOME")
(string-append (getenv "HOME") "/.local/share")))
(define (permissions path)
(define (is-valid? file-path)
(and (file-exists? file-path)
(string=? (string-trim-right
(call-with-input-file file-path get-string-all))
(canonicalize-path path))))
(let* ((file-hash (direnv-file-hash path))
(database-path (string-append (xdg-data-home) "/direnv/")))
(cond
((is-valid? (string-append database-path "deny/" file-hash))
(values 'deny file-hash))
((is-valid? (string-append database-path "allow/" file-hash))
(values 'allow file-hash))
(else
(values 'unknown file-hash)))))
(define (is-allowed? path)
(eq? 'allow (permissions path)))
(define (is-denied? path)
(eq? 'deny (permissions path)))
(define (allow-or-deny! path target-type origin-type)
(let ((type file-hash (permissions path))
(data-home (string-append (xdg-data-home) "/direnv/")))
(match type
(origin-type
(rename-file
(string-append data-home (symbol->string origin-type) "/" file-hash)
(string-append data-home (symbol->string target-type) "/" file-hash)))
(target-type
(warn "not necessary")) ;TODO do that properly
('unknown
(call-with-output-file
(string-append data-home (symbol->string target-type) "/" file-hash)
(cut display (canonicalize-path path) <>))))))
(define (allow! path)
(allow-or-deny! path 'allow 'deny))
(define (deny! path)
(allow-or-deny! path 'deny 'allow))
--
Best regards,
Nicolas Graves
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: [PATCH] shell: Rewrite authorized directories management.
2024-09-10 11:31 bug#73166: shell-autorized-directories Nicolas Graves
2024-09-11 9:52 ` Ludovic Courtès
@ 2024-11-09 21:33 ` Nicolas Graves
1 sibling, 0 replies; 15+ messages in thread
From: Nicolas Graves @ 2024-11-09 21:33 UTC (permalink / raw)
To: 73166; +Cc: ludo, Nicolas Graves, andrew
Let's say you pull code with a malicious change in guix.scm or
manifest.scm from a repo authorized by guix shell. guix shell would
continue to trust it. This commit rewrites the way guix shell allow
model works, by taking inspiration (literaly doing the exact same
thing) on direnv security model.
It adds the options
guix shell --allow
guix shell --deny
Previous allowed directories will be lost, but will continue to work
with guix time-machine.
* guix/utils.scm (data-directory): Add variable.
* guix/scripts/shell.scm
(show-help, %options, auto-detect-manifest): Add options --allow and
--deny.
(shell-file-hash, shell-permission, database-do!): Add variables.
(authorized-directory-file): Remove variable.
(authorized-shell-directory): Rewrite and rename procedure...
(authorized-shell-file): ...to this variable.
(guix-shell): Properly dispatch allow and deny options.
* tests/guix-shell.scm : Adapt tests.
---
guix/scripts/shell.scm | 140 +++++++++++++++++++++++++++++------------
guix/utils.scm | 4 ++
tests/guix-shell.sh | 5 +-
3 files changed, 106 insertions(+), 43 deletions(-)
diff --git a/guix/scripts/shell.scm b/guix/scripts/shell.scm
index d23362a15d..85794745d4 100644
--- a/guix/scripts/shell.scm
+++ b/guix/scripts/shell.scm
@@ -1,6 +1,7 @@
;;; GNU Guix --- Functional package management for GNU
;;; Copyright © 2021-2024 Ludovic Courtès <ludo@gnu.org>
;;; Copyright © 2023 Janneke Nieuwenhuizen <janneke@gnu.org>
+;;; Copyright © 2024 Nicolas Graves <ngraves@ngraves.fr>
;;;
;;; This file is part of GNU Guix.
;;;
@@ -39,7 +40,7 @@ (define-module (guix scripts shell)
#:autoload (ice-9 rdelim) (read-line)
#:autoload (guix base32) (bytevector->base32-string)
#:autoload (rnrs bytevectors) (string->utf8)
- #:autoload (guix utils) (config-directory cache-directory)
+ #:autoload (guix utils) (cache-directory data-directory)
#:autoload (guix describe) (current-channels)
#:autoload (guix channels) (channel-commit)
#:autoload (gcrypt hash) (sha256)
@@ -47,6 +48,9 @@ (define-module (guix scripts shell)
#:use-module (guix cache)
#:use-module ((ice-9 ftw) #:select (scandir))
#:autoload (ice-9 pretty-print) (pretty-print)
+ #:autoload (ice-9 textual-ports) (get-string-all)
+ #:autoload (gcrypt hash) (port-sha256)
+ #:autoload (guix rpm) (bytevector->hex-string)
#:autoload (gnu packages) (cache-is-authoritative?
package-unique-version-prefix
specification->package
@@ -75,6 +79,10 @@ (define (show-help)
(display (G_ "
-F, --emulate-fhs for containers, emulate the Filesystem Hierarchy
Standard (FHS)"))
+ (display (G_ "
+ --allow allow automatic loading of 'guix.scm' and 'manifest.scm'"))
+ (display (G_ "
+ --deny revoke automatic loading of 'guix.scm' and 'manifest.scm'"))
(show-environment-options-help)
(newline)
@@ -149,7 +157,13 @@ (define %options
(option '(#\F "emulate-fhs") #f #f
(lambda (opt name arg result)
- (alist-cons 'emulate-fhs? #t result))))
+ (alist-cons 'emulate-fhs? #t result)))
+ (option '("allow") #f #f
+ (lambda (opt name arg result)
+ (alist-cons 'allow "allow" result)))
+ (option '("deny") #f #f
+ (lambda (opt name arg result)
+ (alist-cons 'deny "deny" result))))
(filter-map (lambda (opt)
(and (not (any (lambda (name)
(member name to-remove))
@@ -189,6 +203,68 @@ (define (handle-argument arg result)
(("--") opts)
(("--" command ...) (alist-cons 'exec command opts))))))))
+(define (shell-file-hash file)
+ "Returns a unique hash for FILE."
+ (let* ((abs-path (canonicalize-path file))
+ (content (call-with-input-file abs-path get-string-all)))
+ (call-with-input-string (string-append abs-path "\n" content)
+ (compose bytevector->hex-string port-sha256))))
+
+(define (shell-permission path)
+ "Returns the current permission of file at PATH ('allow, 'deny or 'unknown)
+and its file-hash."
+ (define (is-valid? file-path)
+ (and (file-exists? file-path)
+ (string=? (string-trim-right
+ (call-with-input-file file-path get-string-all))
+ (canonicalize-path path))))
+ (catch 'system-error
+ (lambda ()
+ (let* ((file-hash (shell-file-hash path))
+ (database (string-append (data-directory) "/shell/")))
+ (cond
+ ((is-valid? (string-append database "deny/" file-hash))
+ (values 'deny file-hash))
+ ((is-valid? (string-append database "allow/" file-hash))
+ (values 'allow file-hash))
+ (else
+ (values 'unknown file-hash)))))
+ (const (values #f #f))))
+
+(define (database-do! target-type path)
+ "Allows or revokes (depending on TARGET-TYPE value) guix shell automatic
+loading for the file at PATH."
+ (let ((type file-hash (shell-permission path))
+ (origin-type (match target-type
+ ('allow 'deny)
+ ('deny 'allow)))
+ (database (string-append (data-directory) "/shell/")))
+ (unless (file-exists? (string-append database "/allow/"))
+ (mkdir-p (string-append database "/allow/"))
+ (mkdir-p (string-append database "/deny/")))
+ (match type
+ ((? (cut eq? origin-type <>))
+ (let ((old-file (string-append
+ database (symbol->string origin-type) "/" file-hash)))
+ (copy-file
+ old-file
+ (string-append database (symbol->string target-type) "/" file-hash))
+ (delete-file old-file)
+ (match target-type
+ ('allow (info (G_ "'~a' allowed!~%") path))
+ ('deny (info (G_ "'~a' denied!~%") path)))))
+ ((? (cut eq? target-type <>))
+ (match target-type
+ ('allow (info (G_ "'~a' is already allowed!~%") path))
+ ('deny (info (G_ "'~a' is already denied!~%") path))))
+ ('unknown
+ (call-with-output-file
+ (string-append database (symbol->string target-type) "/" file-hash)
+ (cut display (canonicalize-path path) <>))
+ (match target-type
+ ('allow (info (G_ "'~a' allowed!~%") path))
+ ('deny (info (G_ "'~a' denied!~%") path)))))))
+
(define (find-file-in-parent-directories candidates)
"Find one of CANDIDATES in the current directory or one of its ancestors."
(define start (getcwd))
@@ -205,39 +281,9 @@ (define device (stat:dev (stat start)))
(and (not (string=? directory "/"))
(loop (dirname directory)))))))) ;lexical ".." resolution
-(define (authorized-directory-file)
- "Return the name of the file listing directories for which 'guix shell' may
-automatically load 'guix.scm' or 'manifest.scm' files."
- (string-append (config-directory) "/shell-authorized-directories"))
-
-(define (authorized-shell-directory? directory)
- "Return true if DIRECTORY is among the authorized directories for automatic
-loading. The list of authorized directories is read from
-'authorized-directory-file'; each line must be either: an absolute file name,
-a hash-prefixed comment, or a blank line."
- (catch 'system-error
- (lambda ()
- (call-with-input-file (authorized-directory-file)
- (lambda (port)
- (let loop ()
- (match (read-line port)
- ((? eof-object?) #f)
- ((= string-trim line)
- (cond ((string-prefix? "#" line) ;comment
- (loop))
- ((string-prefix? "/" line) ;absolute file name
- (or (string=? line directory)
- (loop)))
- ((string-null? (string-trim-right line)) ;blank line
- (loop))
- (else ;bogus line
- (let ((loc (location (port-filename port)
- (port-line port)
- (port-column port))))
- (warning loc (G_ "ignoring invalid file name: '~a'~%")
- line)
- (loop))))))))))
- (const #f)))
+(define (authorized-shell-file? file)
+ "Return true if FILE is among the authorized files for automatic loading."
+ (and=> (shell-permission file) (cut eq? 'allow <>)))
(define (options-with-caching opts)
"If OPTS contains only options that allow us to compute a cache key,
@@ -292,6 +338,8 @@ (define disallow-implicit-load?
(if (or (not interactive?)
disallow-implicit-load?
+ (assoc-ref opts 'allow)
+ (assoc-ref opts 'deny)
(options-contain-payload? opts))
opts
(match (find-file-in-parent-directories '("manifest.scm" "guix.scm"))
@@ -299,7 +347,7 @@ (define disallow-implicit-load?
(warning (G_ "no packages specified; creating an empty environment~%"))
opts)
(file
- (if (authorized-shell-directory? (dirname file))
+ (if (authorized-shell-file? file)
(begin
(info (G_ "loading environment from '~a'...~%") file)
(match (basename file)
@@ -314,11 +362,9 @@ (define disallow-implicit-load?
directory, like so:
@example
-echo ~a >> ~a
+guix shell --allow
@end example\n")
- file
- (dirname file)
- (authorized-directory-file))
+ file)
(exit 1)))))))
\f
@@ -596,4 +642,16 @@ (define interactive?
(if (assoc-ref opts 'export-manifest?)
(export-manifest opts (current-output-port))
- (guix-environment* opts))))
+ (match (or (assoc-ref opts 'allow) (assoc-ref opts 'deny))
+ (#f
+ (guix-environment* opts))
+ (command
+ (match (or (assoc-ref opts 'manifest)
+ (find-file-in-parent-directories
+ '("manifest.scm" "guix.scm")))
+ (#f
+ (report-error
+ (G_ "no 'manifest.scm' or 'guix.scm' file to ~a~%") command)
+ (exit 1))
+ (file
+ (database-do! (string->symbol command) file))))))))
diff --git a/guix/utils.scm b/guix/utils.scm
index f161cb4ef3..51af0435e5 100644
--- a/guix/utils.scm
+++ b/guix/utils.scm
@@ -141,6 +141,7 @@ (define-module (guix utils)
config-directory
cache-directory
+ data-directory
readlink*
go-to-location
@@ -1049,6 +1050,9 @@ (define config-directory
(define cache-directory
(cut xdg-directory "XDG_CACHE_HOME" "/.cache" <...>))
+(define data-directory
+ (cut xdg-directory "XDG_DATA_HOME" "/.local/share" <...>))
+
(define (readlink* file)
"Call 'readlink' until the result is not a symlink."
(define %max-symlink-depth 50)
diff --git a/tests/guix-shell.sh b/tests/guix-shell.sh
index b2f820bf26..0606febd91 100644
--- a/tests/guix-shell.sh
+++ b/tests/guix-shell.sh
@@ -60,7 +60,7 @@ grep "not authorized" "$tmpdir/stderr"
rm "$tmpdir/stderr"
# Authorize the directory.
-echo "$(realpath "$tmpdir")" > "$configdir/guix/shell-authorized-directories"
+(cd "$tmpdir"; guix shell --allow)
# Ignoring 'manifest.scm' and 'guix.scm' in non-interactive use.
(cd "$tmpdir"; guix shell --bootstrap -- true)
@@ -78,6 +78,7 @@ cat > "$tmpdir/fake-shell.sh" <<EOF
exec echo "\$GUIX_ENVIRONMENT"
EOF
chmod +x "$tmpdir/fake-shell.sh"
+(cd "$tmpdir"; SHELL="$(realpath fake-shell.sh)" guix shell --allow)
profile1="$(cd "$tmpdir"; SHELL="$(realpath fake-shell.sh)" guix shell --bootstrap)"
profile2="$(guix shell --bootstrap guile-bootstrap -- "$SHELL" -c 'echo $GUIX_ENVIRONMENT')"
test -n "$profile1"
@@ -157,7 +158,7 @@ then
# Honoring the local 'guix.scm' file.
echo '(@ (guix tests) gnu-make-for-tests)' > "$tmpdir/guix.scm"
- (cd "$tmpdir"; guix shell --bootstrap --search-paths --pure > "b")
+ (cd "$tmpdir"; guix shell --allow; guix shell --bootstrap --search-paths --pure > "b")
cmp "$tmpdir/a" "$tmpdir/b"
rm "$tmpdir/guix.scm"
fi
--
2.46.0
^ permalink raw reply related [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-11-09 14:12 ` Nicolas Graves
@ 2024-11-10 9:58 ` Saku Laesvuori via Bug reports for GNU Guix
2024-11-10 11:26 ` Nicolas Graves
0 siblings, 1 reply; 15+ messages in thread
From: Saku Laesvuori via Bug reports for GNU Guix @ 2024-11-10 9:58 UTC (permalink / raw)
To: Nicolas Graves; +Cc: Ludovic Courtès, 73166, Andrew Tropin
[-- Attachment #1: Type: text/plain, Size: 2920 bytes --]
On Sat, Nov 09, 2024 at 03:12:44PM +0100, Nicolas Graves wrote:
> On 2024-09-11 16:11, Nicolas Graves wrote:
>
> >> That option would add a line to ‘shell-autorized-directories’?
> >
> > Yes. Actually I would like to develop a little more after thinking about
> > that.
> >
> > Let's say you git pull code from a guix-shell-authorized repo and the
> > pull includes some potentially harmful / dangerous code.
> >
> > The assumption of direnv is that the user has to allow the code to run
> > again in this case, putting more emphasis on security. This is not the
> > case in Guix, IIRC. I think it should be done in Guix too.
> >
> > Implementing that kind of additional security will indeed need such an
> > option, for this will need to actually include the hash of the file of
> > something like that.
> >
> > It's actually quite simple in direnv, they take a sha256 hash of the
> > absolute filename + the content of the file.
> > (See
> > https://github.com/nicolas-graves/python-direnv/blob/f8f0967a9772f0775ffe75a68d868c75076f5af4/direnv.py#L36)
> > That hash makes a simple file-based database where a file is allowed based
> > not only on its location but on its location+content.
> >
> > We could have two options to interact with such a database :
> > --allow
> > --revoke
>
> Here's a working draft for some code for that. This is currently able
> to properly allow or deny my direnv-validated directories. With a
> proper direnv rename, we can almost already replace
> authorized-shell-directory? function.
>
> I feel like this is a far more secure and convenient way to manage
> autorized-directories for guix shell. WDYT ?
I do agree that it seems more convenient to run `guix shell --allow`
than copy a rather long line from the hint and run it to append a line
to shell-authorized-directories.
Authorizing files instead of directories does not seem that great of an
idea to me. I doubt it really improves security that much. For example,
all my projects have a .guix/modules/xxx-package.scm file that contains
the package definition and guix.scm just loads it from that file.
Malicious code could be added here without touching the guix.scm file at
all, so the file-based authorization would not notice it.
So this would only increase security when guix.scm does not refer to any
other files in the untrusted directory. Here it might get quite annoying
to re-authorize the directory every time every time someone changes the
version number.
Thus it seems that file-based authorization will only catch
false-positives. At least I would refactor my repository to a guix
channel and load the packaged from there with guix.scm to bypass this
security mechanism before adding any malicious code.
Hashing the entire untrusted directory could work, but I'm not sure
would that have acceptable performance in larger cases.
- Saku
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-11-10 9:58 ` Saku Laesvuori via Bug reports for GNU Guix
@ 2024-11-10 11:26 ` Nicolas Graves
2024-11-11 7:54 ` Saku Laesvuori via Bug reports for GNU Guix
0 siblings, 1 reply; 15+ messages in thread
From: Nicolas Graves @ 2024-11-10 11:26 UTC (permalink / raw)
To: Saku Laesvuori; +Cc: Ludovic Courtès, 73166, Andrew Tropin
On 2024-11-10 11:58, Saku Laesvuori wrote:
>
> I do agree that it seems more convenient to run `guix shell --allow`
> than copy a rather long line from the hint and run it to append a line
> to shell-authorized-directories.
>
> Authorizing files instead of directories does not seem that great of an
> idea to me. I doubt it really improves security that much. For example,
> all my projects have a .guix/modules/xxx-package.scm file that contains
> the package definition and guix.scm just loads it from that file.
> Malicious code could be added here without touching the guix.scm file at
> all, so the file-based authorization would not notice it.
>
> So this would only increase security when guix.scm does not refer to any
> other files in the untrusted directory. Here it might get quite annoying
> to re-authorize the directory every time every time someone changes the
> version number.
Thanks for your feedback Saku.
Indeed, it only increases security for revisions of guix.scm and
manifest.scm, not the repository as a whole. But I think it's the exact
same problematic for tools like direnv (same approach as here) or even
emacs .dir-locals.el (which checks the last modified time of this file
IIRC). They can't vouch for the whole repository, but they can
guarantee that the user explicitely accepted to run a guix.scm or
manifest.scm (respectively a .envrc or .dir-locals.el) that depends on
other files in the repo (that was not a guarantee previously, you could
accept to run a manifest.scm before it depends on files in the repo).
I guess there are two use-cases :
1) scheme development with guix.scm loading local changes: Indeed this
change is not really improving security, but neither is it harmful.
2) custom manifest.scm in non-scheme projects (my use-case): Often in
this case you would only change your manifest.scm, and it indeed
increases security (the alternative would have been to automatically add
the -m manifest.scm option but I'm not feeling secure with this
alternative).
More on my use-case: https://lists.sr.ht/~abcdw/rde-devel/patches/54944
> Thus it seems that file-based authorization will only catch
> false-positives. At least I would refactor my repository to a guix
> channel and load the packaged from there with guix.scm to bypass this
> security mechanism before adding any malicious code.
>
> Hashing the entire untrusted directory could work, but I'm not sure
> would that have acceptable performance in larger cases.
Another option could be to add the expected output path of the guix
shell invocation in the hash? This could be simpler than hashing the
whole directory.
Although I'm not sure this is convenient for neither use-cases.
Validation with guix shell --allow for every code change is not
convenient.
--
Best regards,
Nicolas Graves
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-11-10 11:26 ` Nicolas Graves
@ 2024-11-11 7:54 ` Saku Laesvuori via Bug reports for GNU Guix
2024-11-11 10:40 ` Nicolas Graves
2024-11-12 1:46 ` Suhail Singh
0 siblings, 2 replies; 15+ messages in thread
From: Saku Laesvuori via Bug reports for GNU Guix @ 2024-11-11 7:54 UTC (permalink / raw)
To: Nicolas Graves; +Cc: Ludovic Courtès, 73166, Andrew Tropin
[-- Attachment #1: Type: text/plain, Size: 4355 bytes --]
> > I do agree that it seems more convenient to run `guix shell --allow`
> > than copy a rather long line from the hint and run it to append a line
> > to shell-authorized-directories.
> >
> > Authorizing files instead of directories does not seem that great of an
> > idea to me. I doubt it really improves security that much. For example,
> > all my projects have a .guix/modules/xxx-package.scm file that contains
> > the package definition and guix.scm just loads it from that file.
> > Malicious code could be added here without touching the guix.scm file at
> > all, so the file-based authorization would not notice it.
> >
> > So this would only increase security when guix.scm does not refer to any
> > other files in the untrusted directory. Here it might get quite annoying
> > to re-authorize the directory every time every time someone changes the
> > version number.
>
> Thanks for your feedback Saku.
>
> Indeed, it only increases security for revisions of guix.scm and
> manifest.scm, not the repository as a whole. But I think it's the exact
> same problematic for tools like direnv (same approach as here) or even
> emacs .dir-locals.el (which checks the last modified time of this file
> IIRC). They can't vouch for the whole repository, but they can
> guarantee that the user explicitely accepted to run a guix.scm or
> manifest.scm (respectively a .envrc or .dir-locals.el) that depends on
> other files in the repo (that was not a guarantee previously, you could
> accept to run a manifest.scm before it depends on files in the repo).
Is it common to source other files from direnv or do people normally
just set environment variables and run programs from system PATH? If
sourcing other files is very rare with direnv and very common with guix
shell, comparing the security models is not as useful. I have never used
direnv, so I don't know. Maybe it is also often used to source
semitrusted files.
> I guess there are two use-cases :
> 1) scheme development with guix.scm loading local changes: Indeed this
> change is not really improving security, but neither is it harmful.
This case is a bit broader than just scheme but yes, the change does not
really have an impact here. The projects I refered to are mostly written
in Haskell. I load the package definitions from other files to
guix.scm/manifest.scm just to make the repositories work cleanly as Guix
channels.
> 2) custom manifest.scm in non-scheme projects (my use-case): Often in
> this case you would only change your manifest.scm, and it indeed
> increases security (the alternative would have been to automatically add
> the -m manifest.scm option but I'm not feeling secure with this
> alternative).
> More on my use-case: https://lists.sr.ht/~abcdw/rde-devel/patches/54944
Yes, but only slightly, I think. Because loading code from other files
is normal with guix manifests (see above), an attacker would first
refactor the repository into a guix channel to introduce loading from
another file in a non-suspicious way and only after that include the
malicious code.
> > Thus it seems that file-based authorization will only catch
> > false-positives. At least I would refactor my repository to a guix
> > channel and load the packaged from there with guix.scm to bypass this
> > security mechanism before adding any malicious code.
> >
> > Hashing the entire untrusted directory could work, but I'm not sure
> > would that have acceptable performance in larger cases.
>
> Another option could be to add the expected output path of the guix
> shell invocation in the hash? This could be simpler than hashing the
> whole directory.
That would only secure the shell environment, but the manifest could
still contain something like
```scheme
(system* "rm -rf $HOME")
(specifications->manifest (list "hello"))
```
where the environment is safe but loading it causes bad side
effects.
> Although I'm not sure this is convenient for neither use-cases.
> Validation with guix shell --allow for every code change is not
> convenient.
That too.
Anyway, I am not opposed to this change. The only effects for my use
cases are positive (nicer UI with the --allow flag). I just want to
point out that I don't think this makes any attacks significantly
harder.
- Saku
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-11-11 7:54 ` Saku Laesvuori via Bug reports for GNU Guix
@ 2024-11-11 10:40 ` Nicolas Graves
2024-11-12 1:46 ` Suhail Singh
1 sibling, 0 replies; 15+ messages in thread
From: Nicolas Graves @ 2024-11-11 10:40 UTC (permalink / raw)
To: Saku Laesvuori; +Cc: Ludovic Courtès, 73166, Andrew Tropin
On 2024-11-11 09:54, Saku Laesvuori wrote:
> Is it common to source other files from direnv or do people normally
> just set environment variables and run programs from system PATH? If
> sourcing other files is very rare with direnv and very common with guix
> shell, comparing the security models is not as useful. I have never used
> direnv, so I don't know. Maybe it is also often used to source
> semitrusted files.
In the Nix/Guix space, I guess it's pretty common. At least I do use it
this way (if I need environment variables for emacs or git to behave as
intended in a project for instance). Outside these projects it makes
less sense, but I think it's where it's most used.
One example from my resources directory which requires some env
variables for a git hook to run properly :
export PYTHON="$(cd /tmp && guix shell python-wrapper python-tree-sitter python-pygit2 tree-sitter-bibtex -- which python)"
export PYTHONPATH="$(echo $PYTHON | cut -d/ -f-4)/lib/python$( $PYTHON -V | cut -d' ' -f2 | cut -d. -f-2 )/site-packages"
export TREE_SITTER_BIBTEX_PATH="$(echo $PYTHON | cut -d/ -f-4)/lib/tree-sitter/libtree-sitter-bibtex.so"
>> I guess there are two use-cases :
>> 1) scheme development with guix.scm loading local changes: Indeed this
>> change is not really improving security, but neither is it harmful.
>
> This case is a bit broader than just scheme but yes, the change does not
> really have an impact here. The projects I refered to are mostly written
> in Haskell. I load the package definitions from other files to
> guix.scm/manifest.scm just to make the repositories work cleanly as Guix
> channels.
>
>> 2) custom manifest.scm in non-scheme projects (my use-case): Often in
>> this case you would only change your manifest.scm, and it indeed
>> increases security (the alternative would have been to automatically add
>> the -m manifest.scm option but I'm not feeling secure with this
>> alternative).
>> More on my use-case: https://lists.sr.ht/~abcdw/rde-devel/patches/54944
>
> Yes, but only slightly, I think. Because loading code from other files
> is normal with guix manifests (see above), an attacker would first
> refactor the repository into a guix channel to introduce loading from
> another file in a non-suspicious way and only after that include the
> malicious code.
Agreed. Though the user has to accept the introduction of loading from
another file though, this is what is better in this system IMO. In my
use-case, transforming into a guix channel wouldn't make sense.
> Anyway, I am not opposed to this change. The only effects for my use
> cases are positive (nicer UI with the --allow flag). I just want to
> point out that I don't think this makes any attacks significantly
> harder.
Agreed on the significantly. Let's just not give a false security
guarantee in the commit/news/manual, the user still has to be careful.
--
Best regards,
Nicolas Graves
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-11-11 7:54 ` Saku Laesvuori via Bug reports for GNU Guix
2024-11-11 10:40 ` Nicolas Graves
@ 2024-11-12 1:46 ` Suhail Singh
2024-11-12 7:52 ` Nicolas Graves
1 sibling, 1 reply; 15+ messages in thread
From: Suhail Singh @ 2024-11-12 1:46 UTC (permalink / raw)
To: Nicolas Graves; +Cc: 73166, saku, ludo, andrew
Saku Laesvuori via Bug reports for GNU Guix <bug-guix@gnu.org> writes:
> Anyway, I am not opposed to this change. The only effects for my use
> cases are positive (nicer UI with the --allow flag). I just want to
> point out that I don't think this makes any attacks significantly
> harder.
FWIW, this summarizes my belief as well. I do see some improvements in
convenience, but the threat model where this improves security (threat
actor has access to the repository, but the files are such that the
threat actor isn't able to modify their semantics without first
modifying the files) seems contrived. Am I mistaken?
If not, while I don't have objections to the change (and do believe it
has some value), I do have reservations about claiming security
benefits.
--
Suhail
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-11-12 1:46 ` Suhail Singh
@ 2024-11-12 7:52 ` Nicolas Graves
2024-11-12 14:50 ` Suhail Singh
0 siblings, 1 reply; 15+ messages in thread
From: Nicolas Graves @ 2024-11-12 7:52 UTC (permalink / raw)
To: Suhail Singh; +Cc: 73166, saku, ludo, andrew
On 2024-11-11 20:46, Suhail Singh wrote:
> Saku Laesvuori via Bug reports for GNU Guix <bug-guix@gnu.org> writes:
>
>> Anyway, I am not opposed to this change. The only effects for my use
>> cases are positive (nicer UI with the --allow flag). I just want to
>> point out that I don't think this makes any attacks significantly
>> harder.
>
> FWIW, this summarizes my belief as well. I do see some improvements in
> convenience, but the threat model where this improves security (threat
> actor has access to the repository, but the files are such that the
> threat actor isn't able to modify their semantics without first
> modifying the files) seems contrived. Am I mistaken?
>
> If not, while I don't have objections to the change (and do believe it
> has some value), I do have reservations about claiming security
> benefits.
My last message to Saku basically agreed to this ;)
I still think it improves it for my specific use-case and for the
addition of explicit user agreement to load code exterior to
manifest/guix.scm in the case this file is trusted but compromised.
But I agree the first message was probably too focussed on marginal
security improvements and we shouldn't sell a false promise that could
make people less careful.
I'm actually willing to improve that patch series if you have better
ideas/implementations, I was just building on what I know
(direnv/.dir-locals.el). Maybe we should only allow to automatically run
when the manifest is able to build without network access in container
mode. Or include things like automatic git commit authentication on such
allowed repositories. But I'm not sure if they are convenient or easy
to implement, or make sense.
--
Best regards,
Nicolas Graves
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-11-12 7:52 ` Nicolas Graves
@ 2024-11-12 14:50 ` Suhail Singh
2024-11-12 16:49 ` Nicolas Graves
0 siblings, 1 reply; 15+ messages in thread
From: Suhail Singh @ 2024-11-12 14:50 UTC (permalink / raw)
To: Nicolas Graves; +Cc: 73166, ludo, suhailsingh247, andrew, saku
Nicolas Graves <ngraves@ngraves.fr> writes:
> My last message to Saku basically agreed to this ;)
Yes, my bad for only noticing that message after having sent mine.
Whoops.
> I'm actually willing to improve that patch series if you have better
> ideas/implementations, I was just building on what I know
> (direnv/.dir-locals.el).
As a direnv and .dir-locals.el user myself, I think there's some utility
in doing things similarly, at least till we come up with a threat model
on which we have some consensus and which motivates us to deviate from
the norm.
> Maybe we should only allow to automatically run when the manifest is
> able to build without network access in container mode.
I was under the impression that the build phase in guix is always
containerized and without network access. Could you please elaborate on
this?
> Or include things like automatic git commit authentication on such
> allowed repositories. But I'm not sure if they are convenient or easy
> to implement, or make sense.
While valuable, I believe if we do provide this, it should only be done
in a manner that the user is able to disable if/as needed.
--
Suhail
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-11-12 14:50 ` Suhail Singh
@ 2024-11-12 16:49 ` Nicolas Graves
2024-11-12 17:08 ` Suhail Singh
2024-11-14 11:07 ` Saku Laesvuori via Bug reports for GNU Guix
0 siblings, 2 replies; 15+ messages in thread
From: Nicolas Graves @ 2024-11-12 16:49 UTC (permalink / raw)
To: Suhail Singh; +Cc: 73166, ludo, suhailsingh247, andrew, saku
On 2024-11-12 09:50, Suhail Singh wrote:
> I was under the impression that the build phase in guix is always
> containerized and without network access. Could you please elaborate on
> this?
Building a package yes, but you can have external commands in a
manifest.scm or guix.scm. Saku provided an example in an earlier email
of a valid but dangerous manifest:
```scheme
(system* "rm -rf $HOME")
(specifications->manifest (list "hello"))
```
We could also have one that downloads malicious code, or uploads private
info, the POC is left as an an exercice for the reader ;)
What I was saying is that we could restrain recording `guix shell --allow`
only if the manifest builds properly containerized and without network
access (outside package building I mean), and otherwise refuse to allow
(failing manifest, possibly because it tries to access the network or
files outside the repo) with a warning message, providing the ability to
restrain "automatic loading" to certain "safer" conditions only.
This would in turn mean that (given the same guix revision) we can
always run a `guix shell --allow`-ed using `guix shell --container`
which actually makes a lot of sense in my use-case. I don't really know
about other use-cases, but I guess it's the same, even a scheme
developper would probably want a manifest that doesn't depend on files
outside of his repo or the network. Saku, do you have an opinion on
this?
The downside is that we would have to basically run `guix shell
--container` (and build all there is to build) before being able to run
`guix shell --allow`.
WDYT?
--
Best regards,
Nicolas Graves
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-11-12 16:49 ` Nicolas Graves
@ 2024-11-12 17:08 ` Suhail Singh
2024-11-14 11:07 ` Saku Laesvuori via Bug reports for GNU Guix
1 sibling, 0 replies; 15+ messages in thread
From: Suhail Singh @ 2024-11-12 17:08 UTC (permalink / raw)
To: Nicolas Graves; +Cc: 73166, ludo, suhailsingh247, andrew, saku
Nicolas Graves <ngraves@ngraves.fr> writes:
> Building a package yes, but you can have external commands in a
> manifest.scm or guix.scm.
>
> ...
>
> What I was saying is that we could restrain recording `guix shell --allow`
> only if the manifest builds properly containerized and without network
> access (outside package building I mean), and otherwise refuse to allow
> (failing manifest, possibly because it tries to access the network or
> files outside the repo) with a warning message, providing the ability to
> restrain "automatic loading" to certain "safer" conditions only.
I see. I think in the event that the manifest doesn't build in a
containerized environment without networking access, providing a warning
when using --allow would be quite helpful. It would inform the user of
situations where what's happening in the manifest has fewer guarantees.
If we were to do the above for --allow, but still allow the user to
bypass that via shell-authorized-directories if desired, I believe it
would be a good tradeoff: make well-behaved code easier to use, while
still allowing for less-well-behaved workflows with some minor
inconvenience.
I am assuming in the above that this wouldn't interfere with additional
channels being used in the repo.
> The downside is that we would have to basically run `guix shell
> --container` (and build all there is to build) before being able to
> run `guix shell --allow`.
As long as we properly document this, I think that that's acceptable.
--
Suhail
^ permalink raw reply [flat|nested] 15+ messages in thread
* bug#73166: shell-autorized-directories
2024-11-12 16:49 ` Nicolas Graves
2024-11-12 17:08 ` Suhail Singh
@ 2024-11-14 11:07 ` Saku Laesvuori via Bug reports for GNU Guix
1 sibling, 0 replies; 15+ messages in thread
From: Saku Laesvuori via Bug reports for GNU Guix @ 2024-11-14 11:07 UTC (permalink / raw)
To: Nicolas Graves; +Cc: 73166, ludo, suhailsingh247, andrew
[-- Attachment #1: Type: text/plain, Size: 3114 bytes --]
On Tue, Nov 12, 2024 at 05:49:13PM +0100, Nicolas Graves wrote:
> On 2024-11-12 09:50, Suhail Singh wrote:
>
> > I was under the impression that the build phase in guix is always
> > containerized and without network access. Could you please elaborate on
> > this?
>
> Building a package yes, but you can have external commands in a
> manifest.scm or guix.scm. Saku provided an example in an earlier email
> of a valid but dangerous manifest:
>
> ```scheme
> (system* "rm -rf $HOME")
> (specifications->manifest (list "hello"))
> ```
>
> We could also have one that downloads malicious code, or uploads private
> info, the POC is left as an an exercice for the reader ;)
>
> What I was saying is that we could restrain recording `guix shell --allow`
> only if the manifest builds properly containerized and without network
> access (outside package building I mean), and otherwise refuse to allow
> (failing manifest, possibly because it tries to access the network or
> files outside the repo) with a warning message, providing the ability to
> restrain "automatic loading" to certain "safer" conditions only.
>
> This would in turn mean that (given the same guix revision) we can
> always run a `guix shell --allow`-ed using `guix shell --container`
> which actually makes a lot of sense in my use-case. I don't really know
> about other use-cases, but I guess it's the same, even a scheme
> developper would probably want a manifest that doesn't depend on files
> outside of his repo or the network. Saku, do you have an opinion on
> this?
There are likely some cases where someone would want to define a
manifest that depends on external factors, but I do agree they seem
rare. Probably not in a public project repo but maybe someone would want
to have (for example) different environments in different directories
and some common values in ~/.config that all of them refer to.
> The downside is that we would have to basically run `guix shell
> --container` (and build all there is to build) before being able to run
> `guix shell --allow`.
In the repository manifest use-case this seems to not be a downside (the
user is to build the environment anyway if they authorized it). In other
use-cases this might prevent people from using guix shell --allow even
though their case might be much more secure (like the environments in
different directories sharing common data).
> WDYT?
The only benefit seems to be in situations where the user would want the
shell to be in a container, so maybe in that case the default behaviour
should be to also evaluate the manifest in the container. I don't know
would that be a good choice. It increases security for those who use a
container and don't know that loading an environment is equivalent to
executing the file, but if it leads people assume that loading an
environment is safer than executing a file in general, they have less
security in non-container environments.
We should keep in mind that implicit manifests for guix shell are not
only useful in public repositories.
- Saku
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 15+ messages in thread
end of thread, other threads:[~2024-11-14 11:08 UTC | newest]
Thread overview: 15+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-09-10 11:31 bug#73166: shell-autorized-directories Nicolas Graves
2024-09-11 9:52 ` Ludovic Courtès
2024-09-11 14:11 ` Nicolas Graves
2024-11-09 14:12 ` Nicolas Graves
2024-11-10 9:58 ` Saku Laesvuori via Bug reports for GNU Guix
2024-11-10 11:26 ` Nicolas Graves
2024-11-11 7:54 ` Saku Laesvuori via Bug reports for GNU Guix
2024-11-11 10:40 ` Nicolas Graves
2024-11-12 1:46 ` Suhail Singh
2024-11-12 7:52 ` Nicolas Graves
2024-11-12 14:50 ` Suhail Singh
2024-11-12 16:49 ` Nicolas Graves
2024-11-12 17:08 ` Suhail Singh
2024-11-14 11:07 ` Saku Laesvuori via Bug reports for GNU Guix
2024-11-09 21:33 ` bug#73166: [PATCH] shell: Rewrite authorized directories management Nicolas Graves
Code repositories for project(s) associated with this public inbox
https://git.savannah.gnu.org/cgit/guix.git
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).