Blame SOURCES/0001-GDBus-prefer-getsockopt-style-credentials-passing-AP.patch

2d3b65
From ee502dbbe89a5976c32eb8863c9a9d274ddb60e1 Mon Sep 17 00:00:00 2001
2d3b65
From: Simon McVittie <smcv@collabora.com>
2d3b65
Date: Mon, 14 Oct 2019 08:47:39 +0100
2d3b65
Subject: [PATCH] GDBus: prefer getsockopt()-style credentials-passing APIs
2d3b65
2d3b65
Conceptually, a D-Bus server is really trying to determine the credentials
2d3b65
of (the process that initiated) a connection, not the credentials that
2d3b65
the process had when it sent a particular message. Ideally, it does
2d3b65
this with a getsockopt()-style API that queries the credentials of the
2d3b65
connection's initiator without requiring any particular cooperation from
2d3b65
that process, avoiding a class of possible failures.
2d3b65
2d3b65
The leading '\0' in the D-Bus protocol is primarily a workaround
2d3b65
for platforms where the message-based credentials-passing API is
2d3b65
strictly better than the getsockopt()-style API (for example, on
2d3b65
FreeBSD, SCM_CREDS includes a process ID but getpeereid() does not),
2d3b65
or where the getsockopt()-style API does not exist at all. As a result
2d3b65
libdbus, the reference implementation of D-Bus, does not implement
2d3b65
Linux SCM_CREDENTIALS at all - it has no reason to do so, because the
2d3b65
SO_PEERCRED socket option is equally informative.
2d3b65
2d3b65
This change makes GDBusServer on Linux more closely match the behaviour
2d3b65
of libdbus.
2d3b65
2d3b65
In particular, GNOME/glib#1831 indicates that when a libdbus client
2d3b65
connects to a GDBus server, recvmsg() sometimes yields a SCM_CREDENTIALS
2d3b65
message with cmsg_data={pid=0, uid=65534, gid=65534}. I think this is
2d3b65
most likely a race condition in the early steps to connect:
2d3b65
2d3b65
        client           server
2d3b65
    connect
2d3b65
                         accept
2d3b65
    send '\0' <- race -> set SO_PASSCRED = 1
2d3b65
                         receive '\0'
2d3b65
2d3b65
If the server wins the race:
2d3b65
2d3b65
        client           server
2d3b65
    connect
2d3b65
                         accept
2d3b65
                         set SO_PASSCRED = 1
2d3b65
    send '\0'
2d3b65
                         receive '\0'
2d3b65
2d3b65
then everything is fine. However, if the client wins the race:
2d3b65
2d3b65
        client           server
2d3b65
    connect
2d3b65
                         accept
2d3b65
    send '\0'
2d3b65
                         set SO_PASSCRED = 1
2d3b65
                         receive '\0'
2d3b65
2d3b65
then the kernel does not record credentials for the message containing
2d3b65
'\0' (because SO_PASSCRED was 0 at the time). However, by the time the
2d3b65
server receives the message, the kernel knows that credentials are
2d3b65
desired. I would have expected the kernel to omit the credentials header
2d3b65
in this case, but it seems that instead, it synthesizes a credentials
2d3b65
structure with a dummy process ID 0, a dummy uid derived from
2d3b65
/proc/sys/kernel/overflowuid and a dummy gid derived from
2d3b65
/proc/sys/kernel/overflowgid.
2d3b65
2d3b65
In an unconfigured GDBusServer, hitting this race condition results in
2d3b65
falling back to DBUS_COOKIE_SHA1 authentication, which in practice usually
2d3b65
succeeds in authenticating the peer's uid. However, we encourage AF_UNIX
2d3b65
servers on Unix platforms to allow only EXTERNAL authentication as a
2d3b65
security-hardening measure, because DBUS_COOKIE_SHA1 relies on a series
2d3b65
of assumptions including a cryptographically strong PRNG and a shared
2d3b65
home directory with no write access by others, which are not necessarily
2d3b65
true for all operating systems and users. EXTERNAL authentication will
2d3b65
fail if the server cannot determine the client's credentials.
2d3b65
2d3b65
In particular, this caused a regression when CVE-2019-14822 was fixed
2d3b65
in ibus, which appears to be resolved by this commit. Qt clients
2d3b65
(which use libdbus) intermittently fail to connect to an ibus server
2d3b65
(which uses GDBusServer), because ibus no longer allows DBUS_COOKIE_SHA1
2d3b65
authentication or non-matching uids.
2d3b65
2d3b65
Signed-off-by: Simon McVittie <smcv@collabora.com>
2d3b65
Closes: https://gitlab.gnome.org/GNOME/glib/issues/1831
2d3b65
---
2d3b65
 gio/gcredentialsprivate.h | 18 ++++++++++++++++++
2d3b65
 gio/gdbusauth.c           | 27 +++++++++++++++++++++++++--
2d3b65
 2 files changed, 43 insertions(+), 2 deletions(-)
2d3b65
2d3b65
diff --git a/gio/gcredentialsprivate.h b/gio/gcredentialsprivate.h
2d3b65
index 06f0aed19..e9ec09b9f 100644
2d3b65
--- a/gio/gcredentialsprivate.h
2d3b65
+++ b/gio/gcredentialsprivate.h
2d3b65
@@ -81,6 +81,18 @@
2d3b65
  */
2d3b65
 #undef G_CREDENTIALS_SPOOFING_SUPPORTED
2d3b65
 
2d3b65
+/*
2d3b65
+ * G_CREDENTIALS_PREFER_MESSAGE_PASSING:
2d3b65
+ *
2d3b65
+ * Defined to 1 if the data structure transferred by the message-passing
2d3b65
+ * API is strictly more informative than the one transferred by the
2d3b65
+ * `getsockopt()`-style API, and hence should be preferred, even for
2d3b65
+ * protocols like D-Bus that are defined in terms of the credentials of
2d3b65
+ * the (process that opened the) socket, as opposed to the credentials
2d3b65
+ * of an individual message.
2d3b65
+ */
2d3b65
+#undef G_CREDENTIALS_PREFER_MESSAGE_PASSING
2d3b65
+
2d3b65
 #ifdef __linux__
2d3b65
 #define G_CREDENTIALS_SUPPORTED 1
2d3b65
 #define G_CREDENTIALS_USE_LINUX_UCRED 1
2d3b65
@@ -100,6 +112,12 @@
2d3b65
 #define G_CREDENTIALS_NATIVE_SIZE (sizeof (struct cmsgcred))
2d3b65
 #define G_CREDENTIALS_UNIX_CREDENTIALS_MESSAGE_SUPPORTED 1
2d3b65
 #define G_CREDENTIALS_SPOOFING_SUPPORTED 1
2d3b65
+/* GLib doesn't implement it yet, but FreeBSD's getsockopt()-style API
2d3b65
+ * is getpeereid(), which is not as informative as struct cmsgcred -
2d3b65
+ * it does not tell us the PID. As a result, libdbus prefers to use
2d3b65
+ * SCM_CREDS, and if we implement getpeereid() in future, we should
2d3b65
+ * do the same. */
2d3b65
+#define G_CREDENTIALS_PREFER_MESSAGE_PASSING 1
2d3b65
 
2d3b65
 #elif defined(__NetBSD__)
2d3b65
 #define G_CREDENTIALS_SUPPORTED 1
2d3b65
diff --git a/gio/gdbusauth.c b/gio/gdbusauth.c
2d3b65
index 752ec23fc..14cc5d70e 100644
2d3b65
--- a/gio/gdbusauth.c
2d3b65
+++ b/gio/gdbusauth.c
2d3b65
@@ -31,6 +31,7 @@
2d3b65
 #include "gdbusutils.h"
2d3b65
 #include "gioenumtypes.h"
2d3b65
 #include "gcredentials.h"
2d3b65
+#include "gcredentialsprivate.h"
2d3b65
 #include "gdbusprivate.h"
2d3b65
 #include "giostream.h"
2d3b65
 #include "gdatainputstream.h"
2d3b65
@@ -969,9 +970,31 @@ _g_dbus_auth_run_server (GDBusAuth              *auth,
2d3b65
 
2d3b65
   g_data_input_stream_set_newline_type (dis, G_DATA_STREAM_NEWLINE_TYPE_CR_LF);
2d3b65
 
2d3b65
-  /* first read the NUL-byte */
2d3b65
+  /* read the NUL-byte, possibly with credentials attached */
2d3b65
 #ifdef G_OS_UNIX
2d3b65
-  if (G_IS_UNIX_CONNECTION (auth->priv->stream))
2d3b65
+#ifndef G_CREDENTIALS_PREFER_MESSAGE_PASSING
2d3b65
+  if (G_IS_SOCKET_CONNECTION (auth->priv->stream))
2d3b65
+    {
2d3b65
+      GSocket *sock = g_socket_connection_get_socket (G_SOCKET_CONNECTION (auth->priv->stream));
2d3b65
+
2d3b65
+      local_error = NULL;
2d3b65
+      credentials = g_socket_get_credentials (sock, &local_error);
2d3b65
+
2d3b65
+      if (credentials == NULL && !g_error_matches (local_error, G_IO_ERROR, G_IO_ERROR_NOT_SUPPORTED))
2d3b65
+        {
2d3b65
+          g_propagate_error (error, local_error);
2d3b65
+          goto out;
2d3b65
+        }
2d3b65
+      else
2d3b65
+        {
2d3b65
+          /* Clear the error indicator, so we can retry with
2d3b65
+           * g_unix_connection_receive_credentials() if necessary */
2d3b65
+          g_clear_error (&local_error);
2d3b65
+        }
2d3b65
+    }
2d3b65
+#endif
2d3b65
+
2d3b65
+  if (credentials == NULL && G_IS_UNIX_CONNECTION (auth->priv->stream))
2d3b65
     {
2d3b65
       local_error = NULL;
2d3b65
       credentials = g_unix_connection_receive_credentials (G_UNIX_CONNECTION (auth->priv->stream),
2d3b65
-- 
2d3b65
2.23.0
2d3b65