Blame SOURCES/0001-GDBus-prefer-getsockopt-style-credentials-passing-AP.patch

475f90
From ee502dbbe89a5976c32eb8863c9a9d274ddb60e1 Mon Sep 17 00:00:00 2001
475f90
From: Simon McVittie <smcv@collabora.com>
475f90
Date: Mon, 14 Oct 2019 08:47:39 +0100
475f90
Subject: [PATCH] GDBus: prefer getsockopt()-style credentials-passing APIs
475f90
475f90
Conceptually, a D-Bus server is really trying to determine the credentials
475f90
of (the process that initiated) a connection, not the credentials that
475f90
the process had when it sent a particular message. Ideally, it does
475f90
this with a getsockopt()-style API that queries the credentials of the
475f90
connection's initiator without requiring any particular cooperation from
475f90
that process, avoiding a class of possible failures.
475f90
475f90
The leading '\0' in the D-Bus protocol is primarily a workaround
475f90
for platforms where the message-based credentials-passing API is
475f90
strictly better than the getsockopt()-style API (for example, on
475f90
FreeBSD, SCM_CREDS includes a process ID but getpeereid() does not),
475f90
or where the getsockopt()-style API does not exist at all. As a result
475f90
libdbus, the reference implementation of D-Bus, does not implement
475f90
Linux SCM_CREDENTIALS at all - it has no reason to do so, because the
475f90
SO_PEERCRED socket option is equally informative.
475f90
475f90
This change makes GDBusServer on Linux more closely match the behaviour
475f90
of libdbus.
475f90
475f90
In particular, GNOME/glib#1831 indicates that when a libdbus client
475f90
connects to a GDBus server, recvmsg() sometimes yields a SCM_CREDENTIALS
475f90
message with cmsg_data={pid=0, uid=65534, gid=65534}. I think this is
475f90
most likely a race condition in the early steps to connect:
475f90
475f90
        client           server
475f90
    connect
475f90
                         accept
475f90
    send '\0' <- race -> set SO_PASSCRED = 1
475f90
                         receive '\0'
475f90
475f90
If the server wins the race:
475f90
475f90
        client           server
475f90
    connect
475f90
                         accept
475f90
                         set SO_PASSCRED = 1
475f90
    send '\0'
475f90
                         receive '\0'
475f90
475f90
then everything is fine. However, if the client wins the race:
475f90
475f90
        client           server
475f90
    connect
475f90
                         accept
475f90
    send '\0'
475f90
                         set SO_PASSCRED = 1
475f90
                         receive '\0'
475f90
475f90
then the kernel does not record credentials for the message containing
475f90
'\0' (because SO_PASSCRED was 0 at the time). However, by the time the
475f90
server receives the message, the kernel knows that credentials are
475f90
desired. I would have expected the kernel to omit the credentials header
475f90
in this case, but it seems that instead, it synthesizes a credentials
475f90
structure with a dummy process ID 0, a dummy uid derived from
475f90
/proc/sys/kernel/overflowuid and a dummy gid derived from
475f90
/proc/sys/kernel/overflowgid.
475f90
475f90
In an unconfigured GDBusServer, hitting this race condition results in
475f90
falling back to DBUS_COOKIE_SHA1 authentication, which in practice usually
475f90
succeeds in authenticating the peer's uid. However, we encourage AF_UNIX
475f90
servers on Unix platforms to allow only EXTERNAL authentication as a
475f90
security-hardening measure, because DBUS_COOKIE_SHA1 relies on a series
475f90
of assumptions including a cryptographically strong PRNG and a shared
475f90
home directory with no write access by others, which are not necessarily
475f90
true for all operating systems and users. EXTERNAL authentication will
475f90
fail if the server cannot determine the client's credentials.
475f90
475f90
In particular, this caused a regression when CVE-2019-14822 was fixed
475f90
in ibus, which appears to be resolved by this commit. Qt clients
475f90
(which use libdbus) intermittently fail to connect to an ibus server
475f90
(which uses GDBusServer), because ibus no longer allows DBUS_COOKIE_SHA1
475f90
authentication or non-matching uids.
475f90
475f90
Signed-off-by: Simon McVittie <smcv@collabora.com>
475f90
Closes: https://gitlab.gnome.org/GNOME/glib/issues/1831
475f90
---
475f90
 gio/gcredentialsprivate.h | 18 ++++++++++++++++++
475f90
 gio/gdbusauth.c           | 27 +++++++++++++++++++++++++--
475f90
 2 files changed, 43 insertions(+), 2 deletions(-)
475f90
475f90
diff --git a/gio/gcredentialsprivate.h b/gio/gcredentialsprivate.h
475f90
index 06f0aed19..e9ec09b9f 100644
475f90
--- a/gio/gcredentialsprivate.h
475f90
+++ b/gio/gcredentialsprivate.h
475f90
@@ -81,6 +81,18 @@
475f90
  */
475f90
 #undef G_CREDENTIALS_SPOOFING_SUPPORTED
475f90
 
475f90
+/*
475f90
+ * G_CREDENTIALS_PREFER_MESSAGE_PASSING:
475f90
+ *
475f90
+ * Defined to 1 if the data structure transferred by the message-passing
475f90
+ * API is strictly more informative than the one transferred by the
475f90
+ * `getsockopt()`-style API, and hence should be preferred, even for
475f90
+ * protocols like D-Bus that are defined in terms of the credentials of
475f90
+ * the (process that opened the) socket, as opposed to the credentials
475f90
+ * of an individual message.
475f90
+ */
475f90
+#undef G_CREDENTIALS_PREFER_MESSAGE_PASSING
475f90
+
475f90
 #ifdef __linux__
475f90
 #define G_CREDENTIALS_SUPPORTED 1
475f90
 #define G_CREDENTIALS_USE_LINUX_UCRED 1
475f90
@@ -100,6 +112,12 @@
475f90
 #define G_CREDENTIALS_NATIVE_SIZE (sizeof (struct cmsgcred))
475f90
 #define G_CREDENTIALS_UNIX_CREDENTIALS_MESSAGE_SUPPORTED 1
475f90
 #define G_CREDENTIALS_SPOOFING_SUPPORTED 1
475f90
+/* GLib doesn't implement it yet, but FreeBSD's getsockopt()-style API
475f90
+ * is getpeereid(), which is not as informative as struct cmsgcred -
475f90
+ * it does not tell us the PID. As a result, libdbus prefers to use
475f90
+ * SCM_CREDS, and if we implement getpeereid() in future, we should
475f90
+ * do the same. */
475f90
+#define G_CREDENTIALS_PREFER_MESSAGE_PASSING 1
475f90
 
475f90
 #elif defined(__NetBSD__)
475f90
 #define G_CREDENTIALS_SUPPORTED 1
475f90
diff --git a/gio/gdbusauth.c b/gio/gdbusauth.c
475f90
index 752ec23fc..14cc5d70e 100644
475f90
--- a/gio/gdbusauth.c
475f90
+++ b/gio/gdbusauth.c
475f90
@@ -31,6 +31,7 @@
475f90
 #include "gdbusutils.h"
475f90
 #include "gioenumtypes.h"
475f90
 #include "gcredentials.h"
475f90
+#include "gcredentialsprivate.h"
475f90
 #include "gdbusprivate.h"
475f90
 #include "giostream.h"
475f90
 #include "gdatainputstream.h"
475f90
@@ -969,9 +970,31 @@ _g_dbus_auth_run_server (GDBusAuth              *auth,
475f90
 
475f90
   g_data_input_stream_set_newline_type (dis, G_DATA_STREAM_NEWLINE_TYPE_CR_LF);
475f90
 
475f90
-  /* first read the NUL-byte */
475f90
+  /* read the NUL-byte, possibly with credentials attached */
475f90
 #ifdef G_OS_UNIX
475f90
-  if (G_IS_UNIX_CONNECTION (auth->priv->stream))
475f90
+#ifndef G_CREDENTIALS_PREFER_MESSAGE_PASSING
475f90
+  if (G_IS_SOCKET_CONNECTION (auth->priv->stream))
475f90
+    {
475f90
+      GSocket *sock = g_socket_connection_get_socket (G_SOCKET_CONNECTION (auth->priv->stream));
475f90
+
475f90
+      local_error = NULL;
475f90
+      credentials = g_socket_get_credentials (sock, &local_error);
475f90
+
475f90
+      if (credentials == NULL && !g_error_matches (local_error, G_IO_ERROR, G_IO_ERROR_NOT_SUPPORTED))
475f90
+        {
475f90
+          g_propagate_error (error, local_error);
475f90
+          goto out;
475f90
+        }
475f90
+      else
475f90
+        {
475f90
+          /* Clear the error indicator, so we can retry with
475f90
+           * g_unix_connection_receive_credentials() if necessary */
475f90
+          g_clear_error (&local_error);
475f90
+        }
475f90
+    }
475f90
+#endif
475f90
+
475f90
+  if (credentials == NULL && G_IS_UNIX_CONNECTION (auth->priv->stream))
475f90
     {
475f90
       local_error = NULL;
475f90
       credentials = g_unix_connection_receive_credentials (G_UNIX_CONNECTION (auth->priv->stream),
475f90
-- 
475f90
2.23.0
475f90