Giter Club home page Giter Club logo

Comments (9)

IohannesArnold avatar IohannesArnold commented on July 23, 2024 1

Thanks @ahrtr. I agree that this is not the most elegant design, and that in principle separating lock from unlock like this shouldn't happen. I wanted to suggest it as an upstream option though because it might be an emergency escape valve for others. Vault was a professionally developed piece of software; if they can stumble into this design flaw, so might other developers. So add the option but put a big scary warning in the docs that using this is a code smell; it's there to help you while you refactor your app. But I understand if you don't want this in upstream at all.

@cipherboy if this won't be added upstream, what do you think about patching a temporary fork of bbolt? I still think that getting munlock into bolt_unix.go is the fastest immediate solution to the problem, although not the best long-term solution. If we used a patched fork, we wouldn't even have to edit the Option struct; we could just add the munlock(db, sz) call directly, so this would be a +1/-0 patch, which should be pretty easy to keep in sync with upstream.

are there really people that do run Vault-like software on unecrypted disk drives? How likely is that you store the bbolt file on an encrypted drive, but not your swap? Who still uses swap in 2024? 🤔

I'm a new contributor to the project so I don't think my opinion is authoritative, but I would think that, especially as the free community fork, the OpenBao project would want to have safe defaults for as many possible systems as could be thrown at it. I believe unencryped swap is still the default in several Linux distro; Arch for example.

from bbolt.

ahrtr avatar ahrtr commented on July 23, 2024 1

Based on discussion above, can we close this ticket, since there is no any action from bbolt side?

from bbolt.

ahrtr avatar ahrtr commented on July 23, 2024

I really think the upper applications (e.g. OpenBao in this case) should resolve this issue instead of bbolt.

  • If OpenBao already calls unix.Mlockall(syscall.MCL_CURRENT | syscall.MCL_FUTURE), then bbolt may fail at unix.Mmap. It means that there is no chance to execute munlock at all.
  • I am not a fan of such a proposal. Who locks the pages, then who should be responsible for unlock the pages. Distributing the responsibilities across multiple repositories/projects looks not graceful, and also error prone to me.

One workaround proposal for Openbao:

  • call unix.Mlockall(syscall.MCL_CURRENT) before you call bbolt.Open, bbolt.Update or bbolt.Commit.
  • call bbolt functions/methods...
  • call unix.Mlockall(syscall.MCL_CURRENT | syscall.MCL_FUTURE) afterwards.

Refer to https://man7.org/linux/man-pages/man2/mlock.2.html,

If a call to mlockall() which uses the MCL_FUTURE flag is
followed by another call that does not specify this flag, the
changes made by the MCL_FUTURE call will be lost.

from bbolt.

cipherboy avatar cipherboy commented on July 23, 2024

@ahrtr said (and thanks for the reply!!):

  • call unix.Mlockall(syscall.MCL_CURRENT) before you call bbolt.Open, bbolt.Update or bbolt.Commit.

  • call bbolt functions/methods...

  • call unix.Mlockall(syscall.MCL_CURRENT | syscall.MCL_FUTURE) afterwards.

I'm not quite sure I follow how this'd work.

The first mlockall would lock all presently memory, sure, but wouldn't the third one mlock bbolt as well? I think it'd need to be unix.Mlockall(syscall.MCL_FUTURE) only to prevent that.

But if you ever closed+reopened bbolt afterwards, this new database would be covered under syscall.MCL_FUTURE if I'm not mistaken? In other words, I think we'd need to do it around every bbolt write operation? The latter gets dicey with concurrent access if the parent doesn't lock, no? You risk mlocking other concurrent bbolt operations (if mlockall(CURRENT) is executed in one thread, then mlockall(FUTURE) in another thread, then the first thread calls bbolt's update/commit operations and they mmap more memory...). Even then, you'd want to stop-the-world for database write operations as any other memory you create concurrently may not me mlock'd (or otherwise be fine with it leaking to disk)...

Or, if you open the database and then update it, with the above pattern, wouldn't the bbolt db get mlock'd under the first mlockall(CURRENT) on the write op?

I think this means, if we'd want to do this properly, we'd have to push mlocking into every area of OpenBao, explicitly, since mlockall will chance locking too many things, and chance not locking others?


I do agree in general that the mmap may fail before munlock can be called, so I agree it isn't an ideal solution...

So perhaps the real solution is push bbolt into a separate process and mlockall only the main server process?

from bbolt.

ahrtr avatar ahrtr commented on July 23, 2024

if you ever closed+reopened

Yes, my proposal also has significant limitations. You must open bbolt after calling unix.Mlockall(syscall.MCL_CURRENT), and close bbolt before calling unix.Mlockall(syscall.MCL_CURRENT | syscall.MCL_FUTURE).

perhaps the real solution is push bbolt into a separate process and mlockall only the main server process?

Yes, it's also a solution, but it may need big refactoring/change on upper applications.

from bbolt.

tjungblu avatar tjungblu commented on July 23, 2024

Maybe I need a quick reality check here with a very stupid set of questions:

Disabling mlock is not recommended unless the systems running OpenBao only use encrypted swap or do not use swap at all.

are there really people that do run Vault-like software on unecrypted disk drives? How likely is that you store the bbolt file on an encrypted drive, but not your swap? Who still uses swap in 2024? 🤔

Just to also leave something constructive, what about we're exposing an mmap interface where you could implement your own locking/unblock around the actual mmap syscalls?

from bbolt.

cipherboy avatar cipherboy commented on July 23, 2024

@ahrtr said:

@cipherboy said:

perhaps the real solution is push bbolt into a separate process and mlockall only the main server process?

Yes, it's also a solution, but it may need big refactoring/change on upper applications.

Indeed, but I think it might be the only viable alternative at the minute. In the Raft backend, bbolt is used as the underlying storage and there tend to be lots of read/write operations concurrently (well, only a single writer obviously). We're working on pushing through transactional storage as well, which use bbolt read-only transactions, so operations will need to be concurrent with memory allocation of secrets. Databases can grow rather large as well (I'm aware of 100s+ GB in production IIRC).

@tjungblu said:

@IohannesArnold said:

Disabling mlock is not recommended unless the systems running OpenBao only use encrypted swap or do not use swap at all.

are there really people that do run Vault-like software on unecrypted disk drives? How likely is that you store the bbolt file on an encrypted drive, but not your swap? Who still uses swap in 2024? 🤔

Besides what @IohannesArnold has mentioned above, I think the other point is OpenBao encrypts entries into bbolt. The underlying disk has lower priority for being encrypted. Not that its bad to encrypt disks, just that perhaps in some scenarios it is hard to do securely or not done by default... How can you tell (e.g., as a pod in kubernetes) if your workload is running strictly on encrypted storage? My 2c., but I think overall security posture from using mlock benefits more users, regardless of whether or not their underlying disk is encrypted or not.

(as an aside, the threat model of host compromise is outside the scope of OpenBao).

from bbolt.

cipherboy avatar cipherboy commented on July 23, 2024

Yes, I think this is good. Thanks @ahrtr and @tjungblu for your thoughts!

from bbolt.

IohannesArnold avatar IohannesArnold commented on July 23, 2024

Yes, thanks for your time and consideration.

from bbolt.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.