Add OpenBSD/pledge/unveil
This commit is contained in:
parent
9e67dcebd6
commit
7174643ec4
80
openbsd-pledge-unveil/coreutils-true.c
Normal file
80
openbsd-pledge-unveil/coreutils-true.c
Normal file
@ -0,0 +1,80 @@
|
|||||||
|
/* Exit with a status code indicating success.
|
||||||
|
Copyright (C) 1999-2025 Free Software Foundation, Inc.
|
||||||
|
|
||||||
|
This program is free software: you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation, either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
This program is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program. If not, see <https://www.gnu.org/licenses/>. */
|
||||||
|
|
||||||
|
#include <config.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include "system.h"
|
||||||
|
|
||||||
|
/* Act like "true" by default; false.c overrides this. */
|
||||||
|
#ifndef EXIT_STATUS
|
||||||
|
# define EXIT_STATUS EXIT_SUCCESS
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if EXIT_STATUS == EXIT_SUCCESS
|
||||||
|
# define PROGRAM_NAME "true"
|
||||||
|
#else
|
||||||
|
# define PROGRAM_NAME "false"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#define AUTHORS proper_name ("Jim Meyering")
|
||||||
|
|
||||||
|
void
|
||||||
|
usage (int status)
|
||||||
|
{
|
||||||
|
printf (_("\
|
||||||
|
Usage: %s [ignored command line arguments]\n\
|
||||||
|
or: %s OPTION\n\
|
||||||
|
"),
|
||||||
|
program_name, program_name);
|
||||||
|
printf ("%s\n\n",
|
||||||
|
_(EXIT_STATUS == EXIT_SUCCESS
|
||||||
|
? N_("Exit with a status code indicating success.")
|
||||||
|
: N_("Exit with a status code indicating failure.")));
|
||||||
|
fputs (HELP_OPTION_DESCRIPTION, stdout);
|
||||||
|
fputs (VERSION_OPTION_DESCRIPTION, stdout);
|
||||||
|
printf (USAGE_BUILTIN_WARNING, PROGRAM_NAME);
|
||||||
|
emit_ancillary_info (PROGRAM_NAME);
|
||||||
|
exit (status);
|
||||||
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
main (int argc, char **argv)
|
||||||
|
{
|
||||||
|
/* Recognize --help or --version only if it's the only command-line
|
||||||
|
argument. */
|
||||||
|
if (argc == 2)
|
||||||
|
{
|
||||||
|
initialize_main (&argc, &argv);
|
||||||
|
set_program_name (argv[0]);
|
||||||
|
setlocale (LC_ALL, "");
|
||||||
|
bindtextdomain (PACKAGE, LOCALEDIR);
|
||||||
|
textdomain (PACKAGE);
|
||||||
|
|
||||||
|
/* Note true(1) will return EXIT_FAILURE in the
|
||||||
|
edge case where writes fail with GNU specific options. */
|
||||||
|
atexit (close_stdout);
|
||||||
|
|
||||||
|
if (STREQ (argv[1], "--help"))
|
||||||
|
usage (EXIT_STATUS);
|
||||||
|
|
||||||
|
if (STREQ (argv[1], "--version"))
|
||||||
|
version_etc (stdout, PROGRAM_NAME, PACKAGE_NAME, Version, AUTHORS,
|
||||||
|
(char *) nullptr);
|
||||||
|
}
|
||||||
|
|
||||||
|
return EXIT_STATUS;
|
||||||
|
}
|
498
openbsd-pledge-unveil/doas.c
Normal file
498
openbsd-pledge-unveil/doas.c
Normal file
@ -0,0 +1,498 @@
|
|||||||
|
/* $OpenBSD: doas.c,v 1.99 2024/02/15 18:57:58 tedu Exp $ */
|
||||||
|
/*
|
||||||
|
* Copyright (c) 2015 Ted Unangst <tedu@openbsd.org>
|
||||||
|
*
|
||||||
|
* Permission to use, copy, modify, and distribute this software for any
|
||||||
|
* purpose with or without fee is hereby granted, provided that the above
|
||||||
|
* copyright notice and this permission notice appear in all copies.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||||||
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||||||
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||||||
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||||||
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||||||
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
||||||
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <sys/stat.h>
|
||||||
|
#include <sys/ioctl.h>
|
||||||
|
|
||||||
|
#include <limits.h>
|
||||||
|
#include <login_cap.h>
|
||||||
|
#include <bsd_auth.h>
|
||||||
|
#include <readpassphrase.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <err.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
#include <pwd.h>
|
||||||
|
#include <grp.h>
|
||||||
|
#include <syslog.h>
|
||||||
|
#include <errno.h>
|
||||||
|
#include <fcntl.h>
|
||||||
|
|
||||||
|
#include "doas.h"
|
||||||
|
|
||||||
|
static void __dead
|
||||||
|
usage(void)
|
||||||
|
{
|
||||||
|
fprintf(stderr, "usage: doas [-Lns] [-a style] [-C config] [-u user]"
|
||||||
|
" command [arg ...]\n");
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int
|
||||||
|
parseuid(const char *s, uid_t *uid)
|
||||||
|
{
|
||||||
|
struct passwd *pw;
|
||||||
|
const char *errstr;
|
||||||
|
|
||||||
|
if ((pw = getpwnam(s)) != NULL) {
|
||||||
|
*uid = pw->pw_uid;
|
||||||
|
if (*uid == UID_MAX)
|
||||||
|
return -1;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
*uid = strtonum(s, 0, UID_MAX - 1, &errstr);
|
||||||
|
if (errstr)
|
||||||
|
return -1;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int
|
||||||
|
uidcheck(const char *s, uid_t desired)
|
||||||
|
{
|
||||||
|
uid_t uid;
|
||||||
|
|
||||||
|
if (parseuid(s, &uid) != 0)
|
||||||
|
return -1;
|
||||||
|
if (uid != desired)
|
||||||
|
return -1;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int
|
||||||
|
parsegid(const char *s, gid_t *gid)
|
||||||
|
{
|
||||||
|
struct group *gr;
|
||||||
|
const char *errstr;
|
||||||
|
|
||||||
|
if ((gr = getgrnam(s)) != NULL) {
|
||||||
|
*gid = gr->gr_gid;
|
||||||
|
if (*gid == GID_MAX)
|
||||||
|
return -1;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
*gid = strtonum(s, 0, GID_MAX - 1, &errstr);
|
||||||
|
if (errstr)
|
||||||
|
return -1;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int
|
||||||
|
match(uid_t uid, gid_t *groups, int ngroups, uid_t target, const char *cmd,
|
||||||
|
const char **cmdargs, struct rule *r)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
|
||||||
|
if (r->ident[0] == ':') {
|
||||||
|
gid_t rgid;
|
||||||
|
if (parsegid(r->ident + 1, &rgid) == -1)
|
||||||
|
return 0;
|
||||||
|
for (i = 0; i < ngroups; i++) {
|
||||||
|
if (rgid == groups[i])
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
if (i == ngroups)
|
||||||
|
return 0;
|
||||||
|
} else {
|
||||||
|
if (uidcheck(r->ident, uid) != 0)
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
if (r->target && uidcheck(r->target, target) != 0)
|
||||||
|
return 0;
|
||||||
|
if (r->cmd) {
|
||||||
|
if (strcmp(r->cmd, cmd))
|
||||||
|
return 0;
|
||||||
|
if (r->cmdargs) {
|
||||||
|
/* if arguments were given, they should match explicitly */
|
||||||
|
for (i = 0; r->cmdargs[i]; i++) {
|
||||||
|
if (!cmdargs[i])
|
||||||
|
return 0;
|
||||||
|
if (strcmp(r->cmdargs[i], cmdargs[i]))
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
if (cmdargs[i])
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int
|
||||||
|
permit(uid_t uid, gid_t *groups, int ngroups, const struct rule **lastr,
|
||||||
|
uid_t target, const char *cmd, const char **cmdargs)
|
||||||
|
{
|
||||||
|
size_t i;
|
||||||
|
|
||||||
|
*lastr = NULL;
|
||||||
|
for (i = 0; i < nrules; i++) {
|
||||||
|
if (match(uid, groups, ngroups, target, cmd,
|
||||||
|
cmdargs, rules[i]))
|
||||||
|
*lastr = rules[i];
|
||||||
|
}
|
||||||
|
if (!*lastr)
|
||||||
|
return -1;
|
||||||
|
if ((*lastr)->action == PERMIT)
|
||||||
|
return 0;
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
parseconfig(const char *filename, int checkperms)
|
||||||
|
{
|
||||||
|
extern FILE *yyfp;
|
||||||
|
extern int yyparse(void);
|
||||||
|
struct stat sb;
|
||||||
|
|
||||||
|
yyfp = fopen(filename, "r");
|
||||||
|
if (!yyfp)
|
||||||
|
err(1, checkperms ? "doas is not enabled, %s" :
|
||||||
|
"could not open config file %s", filename);
|
||||||
|
|
||||||
|
if (checkperms) {
|
||||||
|
if (fstat(fileno(yyfp), &sb) != 0)
|
||||||
|
err(1, "fstat(\"%s\")", filename);
|
||||||
|
if ((sb.st_mode & (S_IWGRP|S_IWOTH)) != 0)
|
||||||
|
errx(1, "%s is writable by group or other", filename);
|
||||||
|
if (sb.st_uid != 0)
|
||||||
|
errx(1, "%s is not owned by root", filename);
|
||||||
|
}
|
||||||
|
|
||||||
|
yyparse();
|
||||||
|
fclose(yyfp);
|
||||||
|
if (parse_error)
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void __dead
|
||||||
|
checkconfig(const char *confpath, int argc, char **argv,
|
||||||
|
uid_t uid, gid_t *groups, int ngroups, uid_t target)
|
||||||
|
{
|
||||||
|
const struct rule *rule;
|
||||||
|
int rv;
|
||||||
|
|
||||||
|
setresuid(uid, uid, uid);
|
||||||
|
if (pledge("stdio rpath getpw", NULL) == -1)
|
||||||
|
err(1, "pledge");
|
||||||
|
parseconfig(confpath, 0);
|
||||||
|
if (!argc)
|
||||||
|
exit(0);
|
||||||
|
rv = permit(uid, groups, ngroups, &rule, target, argv[0],
|
||||||
|
(const char **)argv + 1);
|
||||||
|
if (rv == 0) {
|
||||||
|
printf("permit%s\n", (rule->options & NOPASS) ? " nopass" : "");
|
||||||
|
exit(0);
|
||||||
|
} else {
|
||||||
|
printf("deny\n");
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static int
|
||||||
|
authuser_checkpass(char *myname, char *login_style)
|
||||||
|
{
|
||||||
|
char *challenge = NULL, *response, rbuf[1024], cbuf[128];
|
||||||
|
auth_session_t *as;
|
||||||
|
|
||||||
|
if (!(as = auth_userchallenge(myname, login_style, "auth-doas",
|
||||||
|
&challenge))) {
|
||||||
|
warnx("Authentication failed");
|
||||||
|
return AUTH_FAILED;
|
||||||
|
}
|
||||||
|
if (!challenge) {
|
||||||
|
char host[HOST_NAME_MAX + 1];
|
||||||
|
|
||||||
|
if (gethostname(host, sizeof(host)))
|
||||||
|
snprintf(host, sizeof(host), "?");
|
||||||
|
snprintf(cbuf, sizeof(cbuf),
|
||||||
|
"\rdoas (%.32s@%.32s) password: ", myname, host);
|
||||||
|
challenge = cbuf;
|
||||||
|
}
|
||||||
|
response = readpassphrase(challenge, rbuf, sizeof(rbuf),
|
||||||
|
RPP_REQUIRE_TTY);
|
||||||
|
if (response == NULL && errno == ENOTTY) {
|
||||||
|
syslog(LOG_AUTHPRIV | LOG_NOTICE,
|
||||||
|
"tty required for %s", myname);
|
||||||
|
errx(1, "a tty is required");
|
||||||
|
}
|
||||||
|
if (!auth_userresponse(as, response, 0)) {
|
||||||
|
explicit_bzero(rbuf, sizeof(rbuf));
|
||||||
|
syslog(LOG_AUTHPRIV | LOG_NOTICE,
|
||||||
|
"failed auth for %s", myname);
|
||||||
|
warnx("Authentication failed");
|
||||||
|
return AUTH_FAILED;
|
||||||
|
}
|
||||||
|
explicit_bzero(rbuf, sizeof(rbuf));
|
||||||
|
return AUTH_OK;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
authuser(char *myname, char *login_style, int persist)
|
||||||
|
{
|
||||||
|
int i, fd = -1;
|
||||||
|
|
||||||
|
if (persist)
|
||||||
|
fd = open("/dev/tty", O_RDWR);
|
||||||
|
if (fd != -1) {
|
||||||
|
if (ioctl(fd, TIOCCHKVERAUTH) == 0)
|
||||||
|
goto good;
|
||||||
|
}
|
||||||
|
for (i = 0; i < AUTH_RETRIES; i++) {
|
||||||
|
if (authuser_checkpass(myname, login_style) == AUTH_OK)
|
||||||
|
goto good;
|
||||||
|
}
|
||||||
|
exit(1);
|
||||||
|
good:
|
||||||
|
if (fd != -1) {
|
||||||
|
int secs = 5 * 60;
|
||||||
|
ioctl(fd, TIOCSETVERAUTH, &secs);
|
||||||
|
close(fd);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
unveilcommands(const char *ipath, const char *cmd)
|
||||||
|
{
|
||||||
|
char *path = NULL, *p;
|
||||||
|
int unveils = 0;
|
||||||
|
|
||||||
|
if (strchr(cmd, '/') != NULL) {
|
||||||
|
if (unveil(cmd, "x") != -1)
|
||||||
|
unveils++;
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!ipath) {
|
||||||
|
errno = ENOENT;
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
path = strdup(ipath);
|
||||||
|
if (!path) {
|
||||||
|
errno = ENOENT;
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
for (p = path; p && *p; ) {
|
||||||
|
char buf[PATH_MAX];
|
||||||
|
char *cp = strsep(&p, ":");
|
||||||
|
|
||||||
|
if (cp) {
|
||||||
|
int r = snprintf(buf, sizeof buf, "%s/%s", cp, cmd);
|
||||||
|
if (r >= 0 && r < sizeof buf) {
|
||||||
|
if (unveil(buf, "x") != -1)
|
||||||
|
unveils++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
done:
|
||||||
|
free(path);
|
||||||
|
return (unveils);
|
||||||
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
main(int argc, char **argv)
|
||||||
|
{
|
||||||
|
const char *safepath = "/bin:/sbin:/usr/bin:/usr/sbin:"
|
||||||
|
"/usr/local/bin:/usr/local/sbin";
|
||||||
|
const char *confpath = NULL;
|
||||||
|
char *shargv[] = { NULL, NULL };
|
||||||
|
char *sh;
|
||||||
|
const char *p;
|
||||||
|
const char *cmd;
|
||||||
|
char cmdline[LINE_MAX];
|
||||||
|
char mypwbuf[_PW_BUF_LEN], targpwbuf[_PW_BUF_LEN];
|
||||||
|
struct passwd mypwstore, targpwstore;
|
||||||
|
struct passwd *mypw, *targpw;
|
||||||
|
const struct rule *rule;
|
||||||
|
uid_t uid;
|
||||||
|
uid_t target = 0;
|
||||||
|
gid_t groups[NGROUPS_MAX + 1];
|
||||||
|
int ngroups;
|
||||||
|
int i, ch, rv;
|
||||||
|
int sflag = 0;
|
||||||
|
int nflag = 0;
|
||||||
|
char cwdpath[PATH_MAX];
|
||||||
|
const char *cwd;
|
||||||
|
char *login_style = NULL;
|
||||||
|
char **envp;
|
||||||
|
|
||||||
|
setprogname("doas");
|
||||||
|
|
||||||
|
closefrom(STDERR_FILENO + 1);
|
||||||
|
|
||||||
|
uid = getuid();
|
||||||
|
|
||||||
|
while ((ch = getopt(argc, argv, "a:C:Lnsu:")) != -1) {
|
||||||
|
switch (ch) {
|
||||||
|
case 'a':
|
||||||
|
login_style = optarg;
|
||||||
|
break;
|
||||||
|
case 'C':
|
||||||
|
confpath = optarg;
|
||||||
|
break;
|
||||||
|
case 'L':
|
||||||
|
i = open("/dev/tty", O_RDWR);
|
||||||
|
if (i != -1)
|
||||||
|
ioctl(i, TIOCCLRVERAUTH);
|
||||||
|
exit(i == -1);
|
||||||
|
case 'u':
|
||||||
|
if (parseuid(optarg, &target) != 0)
|
||||||
|
errx(1, "unknown user");
|
||||||
|
break;
|
||||||
|
case 'n':
|
||||||
|
nflag = 1;
|
||||||
|
break;
|
||||||
|
case 's':
|
||||||
|
sflag = 1;
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
usage();
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
argv += optind;
|
||||||
|
argc -= optind;
|
||||||
|
|
||||||
|
if (confpath) {
|
||||||
|
if (sflag)
|
||||||
|
usage();
|
||||||
|
} else if ((!sflag && !argc) || (sflag && argc))
|
||||||
|
usage();
|
||||||
|
|
||||||
|
rv = getpwuid_r(uid, &mypwstore, mypwbuf, sizeof(mypwbuf), &mypw);
|
||||||
|
if (rv != 0)
|
||||||
|
err(1, "getpwuid_r failed");
|
||||||
|
if (mypw == NULL)
|
||||||
|
errx(1, "no passwd entry for self");
|
||||||
|
ngroups = getgroups(NGROUPS_MAX, groups);
|
||||||
|
if (ngroups == -1)
|
||||||
|
err(1, "can't get groups");
|
||||||
|
groups[ngroups++] = getgid();
|
||||||
|
|
||||||
|
if (sflag) {
|
||||||
|
sh = getenv("SHELL");
|
||||||
|
if (sh == NULL || *sh == '\0') {
|
||||||
|
shargv[0] = mypw->pw_shell;
|
||||||
|
} else
|
||||||
|
shargv[0] = sh;
|
||||||
|
argv = shargv;
|
||||||
|
argc = 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (confpath) {
|
||||||
|
if (pledge("stdio rpath getpw id", NULL) == -1)
|
||||||
|
err(1, "pledge");
|
||||||
|
checkconfig(confpath, argc, argv, uid, groups, ngroups,
|
||||||
|
target);
|
||||||
|
exit(1); /* fail safe */
|
||||||
|
}
|
||||||
|
|
||||||
|
if (geteuid())
|
||||||
|
errx(1, "not installed setuid");
|
||||||
|
|
||||||
|
parseconfig("/etc/doas.conf", 1);
|
||||||
|
|
||||||
|
/* cmdline is used only for logging, no need to abort on truncate */
|
||||||
|
(void)strlcpy(cmdline, argv[0], sizeof(cmdline));
|
||||||
|
for (i = 1; i < argc; i++) {
|
||||||
|
if (strlcat(cmdline, " ", sizeof(cmdline)) >= sizeof(cmdline))
|
||||||
|
break;
|
||||||
|
if (strlcat(cmdline, argv[i], sizeof(cmdline)) >= sizeof(cmdline))
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd = argv[0];
|
||||||
|
rv = permit(uid, groups, ngroups, &rule, target, cmd,
|
||||||
|
(const char **)argv + 1);
|
||||||
|
if (rv != 0) {
|
||||||
|
syslog(LOG_AUTHPRIV | LOG_NOTICE,
|
||||||
|
"command not permitted for %s: %s", mypw->pw_name, cmdline);
|
||||||
|
errc(1, EPERM, NULL);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!(rule->options & NOPASS)) {
|
||||||
|
if (nflag)
|
||||||
|
errx(1, "Authentication required");
|
||||||
|
|
||||||
|
authuser(mypw->pw_name, login_style, rule->options & PERSIST);
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((p = getenv("PATH")) != NULL)
|
||||||
|
formerpath = strdup(p);
|
||||||
|
if (formerpath == NULL)
|
||||||
|
formerpath = "";
|
||||||
|
|
||||||
|
if (unveil(_PATH_LOGIN_CONF, "r") == -1)
|
||||||
|
err(1, "unveil %s", _PATH_LOGIN_CONF);
|
||||||
|
if (unveil(_PATH_LOGIN_CONF ".db", "r") == -1)
|
||||||
|
err(1, "unveil %s.db", _PATH_LOGIN_CONF);
|
||||||
|
if (unveil(_PATH_LOGIN_CONF_D, "r") == -1)
|
||||||
|
err(1, "unveil %s", _PATH_LOGIN_CONF_D);
|
||||||
|
if (rule->cmd) {
|
||||||
|
if (setenv("PATH", safepath, 1) == -1)
|
||||||
|
err(1, "failed to set PATH '%s'", safepath);
|
||||||
|
}
|
||||||
|
if (unveilcommands(getenv("PATH"), cmd) == 0)
|
||||||
|
goto fail;
|
||||||
|
|
||||||
|
if (pledge("stdio rpath getpw exec id", NULL) == -1)
|
||||||
|
err(1, "pledge");
|
||||||
|
|
||||||
|
rv = getpwuid_r(target, &targpwstore, targpwbuf, sizeof(targpwbuf), &targpw);
|
||||||
|
if (rv != 0)
|
||||||
|
err(1, "getpwuid_r failed");
|
||||||
|
if (targpw == NULL)
|
||||||
|
errx(1, "no passwd entry for target");
|
||||||
|
|
||||||
|
if (setusercontext(NULL, targpw, target, LOGIN_SETGROUP |
|
||||||
|
LOGIN_SETPATH |
|
||||||
|
LOGIN_SETPRIORITY | LOGIN_SETRESOURCES | LOGIN_SETUMASK |
|
||||||
|
LOGIN_SETUSER | LOGIN_SETENV | LOGIN_SETRTABLE) != 0)
|
||||||
|
errx(1, "failed to set user context for target");
|
||||||
|
|
||||||
|
if (pledge("stdio rpath exec", NULL) == -1)
|
||||||
|
err(1, "pledge");
|
||||||
|
|
||||||
|
if (getcwd(cwdpath, sizeof(cwdpath)) == NULL)
|
||||||
|
cwd = "(failed)";
|
||||||
|
else
|
||||||
|
cwd = cwdpath;
|
||||||
|
|
||||||
|
if (pledge("stdio exec", NULL) == -1)
|
||||||
|
err(1, "pledge");
|
||||||
|
|
||||||
|
if (!(rule->options & NOLOG)) {
|
||||||
|
syslog(LOG_AUTHPRIV | LOG_INFO,
|
||||||
|
"%s ran command %s as %s from %s",
|
||||||
|
mypw->pw_name, cmdline, targpw->pw_name, cwd);
|
||||||
|
}
|
||||||
|
|
||||||
|
envp = prepenv(rule, mypw, targpw);
|
||||||
|
|
||||||
|
/* setusercontext set path for the next process, so reset it for us */
|
||||||
|
if (rule->cmd) {
|
||||||
|
if (setenv("PATH", safepath, 1) == -1)
|
||||||
|
err(1, "failed to set PATH '%s'", safepath);
|
||||||
|
} else {
|
||||||
|
if (setenv("PATH", formerpath, 1) == -1)
|
||||||
|
err(1, "failed to set PATH '%s'", formerpath);
|
||||||
|
}
|
||||||
|
execvpe(cmd, argv, envp);
|
||||||
|
fail:
|
||||||
|
if (errno == ENOENT)
|
||||||
|
errx(1, "%s: command not found", cmd);
|
||||||
|
err(1, "%s", cmd);
|
||||||
|
}
|
BIN
openbsd-pledge-unveil/openbsd-7.6.jpg
Normal file
BIN
openbsd-pledge-unveil/openbsd-7.6.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 5.1 MiB |
389
openbsd-pledge-unveil/openbsd-pledge-unveil.md
Executable file
389
openbsd-pledge-unveil/openbsd-pledge-unveil.md
Executable file
@ -0,0 +1,389 @@
|
|||||||
|
#!/bin/env slides
|
||||||
|
|
||||||
|
# OpenBSD, pledge(), and unveil()
|
||||||
|
|
||||||
|
_By Bruce Hill_
|
||||||
|
|
||||||
|
```
|
||||||
|
_.-|-/\-._
|
||||||
|
\-' '-.
|
||||||
|
/ /\ /\ \/ _____ ____ _____ _____
|
||||||
|
\/ < . > ./. \/ / ___ \ | _ \ / ____| __ \
|
||||||
|
_ / < > /___\ |. / / / /___ ___ ____ | |_) | (___ | | | |
|
||||||
|
.< \ / < /\ > ( #) |#) / / / / __ \/ _ \/ __ \| _ < \___ \| | | |
|
||||||
|
| | < /\ -. __\ / /__/ / /_/ / __/ / / /| |_) |____) | |__| |
|
||||||
|
\ < < V > )./_._(\ \_____/ .___/\___/_/ /_/ |____/|_____/|_____/
|
||||||
|
.)/\ < < .- / \_'_) )-.. /_/
|
||||||
|
\ < ./ / > > /._./
|
||||||
|
/\ < '-' > > /
|
||||||
|
'-._ < v > _.-'
|
||||||
|
/ '-.______.-' \
|
||||||
|
\/
|
||||||
|
```
|
||||||
|
|
||||||
|
(Puffy the OpenBSD mascot)
|
||||||
|
|
||||||
|
---------------------------------
|
||||||
|
|
||||||
|
# OpenBSD
|
||||||
|
|
||||||
|
- BSD = Berkeley Software Distribution
|
||||||
|
- Also known as "Berkeley Unix"
|
||||||
|
- MacOS is based on BSD
|
||||||
|
|
||||||
|
```demo
|
||||||
|
sxiv -sf -f os-family-tree.png
|
||||||
|
```
|
||||||
|
|
||||||
|
- Kinda like Linux, but cooler!
|
||||||
|
- Better security
|
||||||
|
- Simpler design
|
||||||
|
- ...but maybe worse for personal computing
|
||||||
|
- But great for web servers!
|
||||||
|
- My website runs on OpenBSD!
|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# Linux Analogy
|
||||||
|
|
||||||
|
The BSD Family:
|
||||||
|
|
||||||
|
- **FreeBSD:** the _Ubuntu_ of the BSD family
|
||||||
|
- Relatively user-friendly
|
||||||
|
- Good for desktops
|
||||||
|
- **NetBSD:** the _Linux Mint_ of the BSD family
|
||||||
|
- Very portable
|
||||||
|
- Good for low-resource machines
|
||||||
|
- **OpenBSD:** the _Arch/Qubes_ of the BSD family
|
||||||
|
- Great documentation (manpages)
|
||||||
|
- **High emphasis on security**
|
||||||
|
|
||||||
|
--------------------------------------
|
||||||
|
|
||||||
|
# OpenBSD
|
||||||
|
|
||||||
|
- Probably more secure than any OS you've ever used
|
||||||
|
- Maybe Qubes is a contender? Debatable.
|
||||||
|
- Really excellent code quality
|
||||||
|
- Great learning resource
|
||||||
|
- Ports collection for package management
|
||||||
|
- Very cool, but out of scope for today
|
||||||
|
- Numerous security improvements exported to other platforms:
|
||||||
|
- OpenSSH
|
||||||
|
- `strlcpy()`
|
||||||
|
- `arc4random()`
|
||||||
|
- Some security improvements that **should** be exported:
|
||||||
|
- `unveil()`
|
||||||
|
- `pledge()`
|
||||||
|
|
||||||
|
-------------------------------------
|
||||||
|
|
||||||
|
# Tangent: Release Artwork
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
-------------------------------------
|
||||||
|
|
||||||
|
# Tangent: Release Artwork
|
||||||
|
|
||||||
|
[Every OS release has artwork and music made by the community](https://www.openbsd.org/artwork.html)
|
||||||
|
|
||||||
|
Every six months since 1996!
|
||||||
|
|
||||||
|
-------------------------------------
|
||||||
|
|
||||||
|
# Defense in Depth
|
||||||
|
|
||||||
|
OpenBSD operates on the assumption that users
|
||||||
|
**will** write and run software with bugs.
|
||||||
|
|
||||||
|
**What happens next will amaze you!**
|
||||||
|
|
||||||
|
When a program starts, it has some idea of what the
|
||||||
|
expected behavior will be.
|
||||||
|
|
||||||
|
- Which files or directories it needs to access
|
||||||
|
- Which system calls will be needed
|
||||||
|
- What _kind of thing_ the program is doing
|
||||||
|
|
||||||
|
The idea is to **pre-commit** to only doing those things.
|
||||||
|
|
||||||
|
If a program has a bug that allows for unintended behavior,
|
||||||
|
**OpenBSD will limit the fallout of that bug.**
|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# Unveil
|
||||||
|
|
||||||
|
```c
|
||||||
|
int unveil(const char *path, const char *permissions)
|
||||||
|
```
|
||||||
|
|
||||||
|
When a program starts, it can restrict itself
|
||||||
|
to certain parts of the filesystem with `unveil()`
|
||||||
|
|
||||||
|
- Limit which files and directories the program can see
|
||||||
|
- Change whether the program has read/write/execute permissions on files
|
||||||
|
|
||||||
|
This is **enforced by the OS** and it will cause
|
||||||
|
system calls like `open()` to return error values as
|
||||||
|
if those files didn't exist or didn't have those
|
||||||
|
permissions.
|
||||||
|
|
||||||
|
Unveil is **additive** so once you call it, it
|
||||||
|
closes off access to all files on the filesystem
|
||||||
|
except the ones you _add_ access to.
|
||||||
|
|
||||||
|
```demo
|
||||||
|
less unveil.txt
|
||||||
|
```
|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# Chroot Jail Comparison
|
||||||
|
|
||||||
|
`unveil()` is similar to `chroot`, but much, much
|
||||||
|
easier to use.
|
||||||
|
|
||||||
|
**Chroot:**
|
||||||
|
|
||||||
|
- Run a program in a fake (restricted) filesystem
|
||||||
|
- Only include copies of stuff you want
|
||||||
|
- Run your program so it thinks that is the whole filesystem
|
||||||
|
- Annoying to set up
|
||||||
|
- Requires copying files
|
||||||
|
|
||||||
|
**Unveil:**
|
||||||
|
|
||||||
|
- Selectively mask off parts of the existing filesystem
|
||||||
|
- Easy to add a few function calls or wrap a program
|
||||||
|
- Don't need to copy any files
|
||||||
|
- Can easily do read-only or write-only access
|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# Using unveil()
|
||||||
|
|
||||||
|
`unveil()` is a drop-in security measure that can make
|
||||||
|
a program more secure _without invasive changes._
|
||||||
|
|
||||||
|
You _just_ have to add a call to `unveil()` to the
|
||||||
|
top of your program and any program that correctly
|
||||||
|
handles non-existent files works as you would hope.
|
||||||
|
|
||||||
|
```python
|
||||||
|
def buggy_write_to_tempfile(filename: str, contents: str):
|
||||||
|
with open("/tmp/" + filename, "w") as f:
|
||||||
|
f.write(contents)
|
||||||
|
|
||||||
|
# Uh oh!
|
||||||
|
buggy_write_to_tempfile("../etc/passwd", "Oh no")
|
||||||
|
```
|
||||||
|
|
||||||
|
Let's make it secure:
|
||||||
|
|
||||||
|
```python
|
||||||
|
import openbsd
|
||||||
|
openbsd.unveil("/tmp", "rw")
|
||||||
|
|
||||||
|
# Now this is safe(r)!
|
||||||
|
buggy_write_to_tempfile("../etc/passwd", "Oh no")
|
||||||
|
```
|
||||||
|
|
||||||
|
Now we can't read or write any file outside of `/tmp`!
|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# Pledge
|
||||||
|
|
||||||
|
```c
|
||||||
|
int pledge(const char *promises, const char *execpromises)
|
||||||
|
```
|
||||||
|
|
||||||
|
`pledge()` lets you restrict which **system calls**
|
||||||
|
the current program is allowed to make (and which
|
||||||
|
ones any child processes can make).
|
||||||
|
|
||||||
|
Some interesting permissions:
|
||||||
|
|
||||||
|
- `stdio`: do standard I/O operations like reading `stdin` and printing to `stdout`
|
||||||
|
- `rpath`: perform **read-only** operations on the filesystem (e.g. `cat`)
|
||||||
|
- `wpath`: perform **write-only** operations on the filesystem (e.g. a logger)
|
||||||
|
- `inet`: do networking stuff like access the internet
|
||||||
|
- `exec`: execute other programs
|
||||||
|
- `unveil`: call `unveil()` to allow access to more files **(!!!)**
|
||||||
|
|
||||||
|
```demo
|
||||||
|
less pledge.txt
|
||||||
|
```
|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# Pledge Case Study: Echo
|
||||||
|
|
||||||
|
The `echo` program in the OpenBSD codebase
|
||||||
|
(slightly modified)
|
||||||
|
|
||||||
|
```c
|
||||||
|
int main(int argc, char *argv[]) {
|
||||||
|
if (pledge("stdio", NULL) == -1)
|
||||||
|
err(1, "pledge");
|
||||||
|
|
||||||
|
while (*argv) {
|
||||||
|
(void)fputs(*argv, stdout);
|
||||||
|
if (*++argv)
|
||||||
|
putchar(' ');
|
||||||
|
}
|
||||||
|
putchar('\n');
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
Even if there were a bug in this program, it is
|
||||||
|
_near impossible_ for the program to do anything other
|
||||||
|
than read `stdin` and print to `stdout`!
|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# Pledge Narrowing: cat
|
||||||
|
|
||||||
|
Another useful technique is to start with maximum
|
||||||
|
permissions and gradually drop permissions as you go.
|
||||||
|
|
||||||
|
Here's a [simplified](https://github.com/openbsd/src/blob/master/bin/cat/cat.c) version of `cat`:
|
||||||
|
|
||||||
|
```c
|
||||||
|
int main(int argc, char *argv[]) {
|
||||||
|
pledge("stdio rpath", NULL);
|
||||||
|
|
||||||
|
FILE *f = argc == 1 ? stdout : fopen(argv[1], "r");
|
||||||
|
|
||||||
|
// Don't need FS read permissions anymore
|
||||||
|
pledge("stdio", NULL);
|
||||||
|
|
||||||
|
char buf[100];
|
||||||
|
size_t just_read;
|
||||||
|
while ((just_read=fread(buf, 1, sizeof(buf), f)) > 0)
|
||||||
|
fwrite(buf, 1, just_read, stdout);
|
||||||
|
|
||||||
|
fclose(f);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
**💀 BAD PRACTICE: not checking return values 💀**
|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# Combined pledge/unveil Example
|
||||||
|
|
||||||
|
From `fsck.c`, which checks the filesystem:
|
||||||
|
|
||||||
|
```c
|
||||||
|
if (unveil("/dev", "rw") == -1)
|
||||||
|
err(1, "unveil /dev");
|
||||||
|
if (unveil("/etc/fstab", "r") == -1)
|
||||||
|
err(1, "unveil %s", _PATH_FSTAB);
|
||||||
|
if (unveil("/sbin", "x") == -1)
|
||||||
|
err(1, "unveil /sbin");
|
||||||
|
if (pledge("stdio rpath wpath disklabel proc exec", NULL) == -1)
|
||||||
|
err(1, "pledge");
|
||||||
|
```
|
||||||
|
|
||||||
|
It can:
|
||||||
|
|
||||||
|
1. Read and write to `/dev`
|
||||||
|
2. Read `/etc/fstab`
|
||||||
|
3. Run programs in `/sbin`
|
||||||
|
4. Do I/O, filesystem stuff, and run programs from `/sbin`
|
||||||
|
|
||||||
|
It cannot:
|
||||||
|
|
||||||
|
1. Access password files
|
||||||
|
2. Read from user's home directory
|
||||||
|
3. Write files anywhere besides `/dev`
|
||||||
|
4. Connect to the internet
|
||||||
|
5. Kill other processes
|
||||||
|
6. **Change my `pledge()`/`unveil()` permissions further (!!!)**
|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
# Case Study: Firefox
|
||||||
|
|
||||||
|
>Firefox on OpenBSD is secured with pledge(2) and unveil(2)
|
||||||
|
>to limit the system calls and filesystem access that each
|
||||||
|
>of Firefox's process types (main, content, remote data decoder,
|
||||||
|
>audio decoder, socket and GPU) is permitted.
|
||||||
|
>**By default, only ~/Downloads and /tmp can be written to**
|
||||||
|
>when downloading files, or when viewing local files
|
||||||
|
>as file:// URLs.
|
||||||
|
|
||||||
|
Even if there are bugs in a massive program like Firefox,
|
||||||
|
the scope of the damage an attacker could do is limited!
|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# Conclusion
|
||||||
|
|
||||||
|
I hope you think these security tools are as cool as I do!
|
||||||
|
|
||||||
|
OpenBSD is a really great OS to run on a web server where
|
||||||
|
you care a lot about security!
|
||||||
|
|
||||||
|
Most of the built-in software that ships with the OS makes
|
||||||
|
good use of `pledge()` and `unveil()` to give you better
|
||||||
|
security!
|
||||||
|
|
||||||
|
Try it yourself sometime! It's mostly familiar to Mac/Linux
|
||||||
|
users, but with a few galaxy brain ideas.
|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# The End
|
||||||
|
|
||||||
|
_Thanks for your time!_
|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# Footnote 1: Code Quality
|
||||||
|
|
||||||
|
Compare OpenBSD's implementation of `true`:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
With the GNU Coure Utilities implementation used in Linux:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# Footnote 2: Code Quality
|
||||||
|
|
||||||
|
OpenBSD comes with `doas`, which is under 500 lines of code:
|
||||||
|
|
||||||
|
```
|
||||||
|
*******************************************************************************
|
||||||
|
Language files blank comment code
|
||||||
|
*******************************************************************************
|
||||||
|
C 1 55 19 424
|
||||||
|
*******************************************************************************
|
||||||
|
```
|
||||||
|
|
||||||
|
The `sudo` that comes with Linux is nearly a quarter million lines of code!
|
||||||
|
|
||||||
|
```
|
||||||
|
*******************************************************************************
|
||||||
|
Language files blank comment code
|
||||||
|
*******************************************************************************
|
||||||
|
C 468 18,038 28,119 132,203
|
||||||
|
PO File 74 30,350 48,907 78,866
|
||||||
|
Bourne Shell 94 8,868 6,387 51,341
|
||||||
|
m4 24 1336 607 14,761
|
||||||
|
...
|
||||||
|
*******************************************************************************
|
||||||
|
SUM: 717 59,673 85,426 284,387
|
||||||
|
*******************************************************************************
|
||||||
|
```
|
||||||
|
|
||||||
|
[More lines of code = more risk of vulnerabilities](https://www.alibabacloud.com/help/en/ecs/vulnerability-announcement-or-linux-sudo-permission-vulnerability)
|
||||||
|
|
9
openbsd-pledge-unveil/openbsd-true.c
Normal file
9
openbsd-pledge-unveil/openbsd-true.c
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
/* $OpenBSD: true.c,v 1.1 2015/11/11 19:05:28 deraadt Exp $ */
|
||||||
|
|
||||||
|
/* Public domain - Theo de Raadt */
|
||||||
|
|
||||||
|
int
|
||||||
|
main(int argc, char *argv[])
|
||||||
|
{
|
||||||
|
return (0);
|
||||||
|
}
|
BIN
openbsd-pledge-unveil/os-family-tree.png
Normal file
BIN
openbsd-pledge-unveil/os-family-tree.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 29 KiB |
300
openbsd-pledge-unveil/pledge.txt
Normal file
300
openbsd-pledge-unveil/pledge.txt
Normal file
@ -0,0 +1,300 @@
|
|||||||
|
PLEDGE(2) System Calls Manual PLEDGE(2)
|
||||||
|
|
||||||
|
NNAAMMEE
|
||||||
|
pplleeddggee - restrict system operations
|
||||||
|
|
||||||
|
SSYYNNOOPPSSIISS
|
||||||
|
##iinncclluuddee <<uunniissttdd..hh>>
|
||||||
|
|
||||||
|
_i_n_t
|
||||||
|
pplleeddggee(_c_o_n_s_t _c_h_a_r _*_p_r_o_m_i_s_e_s, _c_o_n_s_t _c_h_a_r _*_e_x_e_c_p_r_o_m_i_s_e_s);
|
||||||
|
|
||||||
|
DDEESSCCRRIIPPTTIIOONN
|
||||||
|
The pplleeddggee() system call forces the current process into a restricted-
|
||||||
|
service operating mode. A few subsets are available, roughly described
|
||||||
|
as computation, memory management, read-write operations on file
|
||||||
|
descriptors, opening of files, networking (and notably separate, DNS
|
||||||
|
resolution). In general, these modes were selected by studying the
|
||||||
|
operation of many programs using libc and other such interfaces, and
|
||||||
|
setting _p_r_o_m_i_s_e_s or _e_x_e_c_p_r_o_m_i_s_e_s.
|
||||||
|
|
||||||
|
Use of pplleeddggee() in an application will require at least some study and
|
||||||
|
understanding of the interfaces called. Subsequent calls to pplleeddggee() can
|
||||||
|
reduce the abilities further, but abilities can never be regained.
|
||||||
|
|
||||||
|
A process which attempts a restricted operation is killed with an
|
||||||
|
uncatchable SIGABRT, delivering a core file if possible. A process
|
||||||
|
currently running with pledge has state `p' in ps(1) output; a process
|
||||||
|
that was terminated due to a pledge violation is accounted by lastcomm(1)
|
||||||
|
with the `P' flag.
|
||||||
|
|
||||||
|
A _p_r_o_m_i_s_e_s value of "" restricts the process to the _exit(2) system call.
|
||||||
|
This can be used for pure computation operating on memory shared with
|
||||||
|
another process.
|
||||||
|
|
||||||
|
Passing NULL to _p_r_o_m_i_s_e_s or _e_x_e_c_p_r_o_m_i_s_e_s specifies to not change the
|
||||||
|
current value.
|
||||||
|
|
||||||
|
Some system calls, when allowed, have restrictions applied to them:
|
||||||
|
|
||||||
|
access(2):
|
||||||
|
May check for existence of _/_e_t_c_/_l_o_c_a_l_t_i_m_e.
|
||||||
|
|
||||||
|
adjtime(2):
|
||||||
|
Read-only, for ntpd(8).
|
||||||
|
|
||||||
|
chmod(2), fchmod(2), fchmodat(2), chown(2), lchown(2), fchown(2),
|
||||||
|
fchownat(2), mkfifo(2), and mknod(2):
|
||||||
|
Setuid/setgid/sticky bits are ignored. The user or group cannot be
|
||||||
|
changed on a file.
|
||||||
|
|
||||||
|
ioctl(2):
|
||||||
|
Only the FIONREAD, FIONBIO, FIOCLEX, and FIONCLEX operations are
|
||||||
|
allowed by default. Various ioctl requests are allowed against
|
||||||
|
specific file descriptors based upon the requests aauuddiioo, bbppff,
|
||||||
|
ddiisskkllaabbeell, ddrrmm, iinneett, ppff, rroouuttee, wwrroouuttee, ttaappee, ttttyy, vviiddeeoo, and vvmmmm.
|
||||||
|
|
||||||
|
mmap(2) and mprotect(2):
|
||||||
|
PROT_EXEC isn't allowed.
|
||||||
|
|
||||||
|
open(2):
|
||||||
|
May open _/_e_t_c_/_l_o_c_a_l_t_i_m_e and any files below _/_u_s_r_/_s_h_a_r_e_/_z_o_n_e_i_n_f_o.
|
||||||
|
|
||||||
|
profil(2):
|
||||||
|
Can only disable profiling.
|
||||||
|
|
||||||
|
pplleeddggee():
|
||||||
|
Can only reduce permissions for _p_r_o_m_i_s_e_s and _e_x_e_c_p_r_o_m_i_s_e_s.
|
||||||
|
|
||||||
|
sysctl(2):
|
||||||
|
A small set of read-only operations are allowed, sufficient to
|
||||||
|
support: getdomainname(3), gethostname(3), getifaddrs(3), uname(3),
|
||||||
|
and system sensor readings.
|
||||||
|
|
||||||
|
The _p_r_o_m_i_s_e_s argument is specified as a string, with space separated
|
||||||
|
keywords:
|
||||||
|
|
||||||
|
ssttddiioo The following system calls are permitted. sendto(2) is
|
||||||
|
only permitted if its destination socket address is
|
||||||
|
NULL. As a result, all the expected functionalities of
|
||||||
|
libc stdio work.
|
||||||
|
|
||||||
|
clock_getres(2), clock_gettime(2), close(2),
|
||||||
|
closefrom(2), dup(2), dup2(2), dup3(2), fchdir(2),
|
||||||
|
fcntl(2), fstat(2), fsync(2), ftruncate(2),
|
||||||
|
getdtablecount(2), getegid(2), getentropy(2),
|
||||||
|
geteuid(2), getgid(2), getgroups(2), getitimer(2),
|
||||||
|
getlogin(2), getpgid(2), getpgrp(2), getpid(2),
|
||||||
|
getppid(2), getresgid(2), getresuid(2), getrlimit(2),
|
||||||
|
getrtable(2), getsid(2), getthrid(2), gettimeofday(2),
|
||||||
|
getuid(2), issetugid(2), kevent(2), kqueue(2),
|
||||||
|
kqueue1(2), lseek(2), madvise(2), minherit(2), mmap(2),
|
||||||
|
mprotect(2), mquery(2), munmap(2), nanosleep(2),
|
||||||
|
pipe(2), pipe2(2), poll(2), pread(2), preadv(2),
|
||||||
|
profil(2), pwrite(2), pwritev(2), read(2), readv(2),
|
||||||
|
recvfrom(2), recvmsg(2), select(2), sendmsg(2),
|
||||||
|
sendsyslog(2), sendto(2), setitimer(2), shutdown(2),
|
||||||
|
sigaction(2), sigprocmask(2), sigreturn(2),
|
||||||
|
socketpair(2), umask(2), wait4(2), waitid(2), write(2),
|
||||||
|
writev(2)
|
||||||
|
|
||||||
|
rrppaatthh A number of system calls are allowed if they only cause
|
||||||
|
read-only effects on the filesystem, or expose filenames
|
||||||
|
to programs:
|
||||||
|
|
||||||
|
chdir(2), getcwd(3), getdents(2), openat(2), fstatat(2),
|
||||||
|
faccessat(2), readlinkat(2), lstat(2), chmod(2),
|
||||||
|
fchmod(2), fchmodat(2), chflags(2), chflagsat(2),
|
||||||
|
chown(2), fchown(2), fchownat(2), fstat(2), getfsstat(2)
|
||||||
|
|
||||||
|
wwppaatthh A number of system calls are allowed and may cause
|
||||||
|
write-effects on the filesystem:
|
||||||
|
|
||||||
|
getcwd(3), openat(2), fstatat(2), faccessat(2),
|
||||||
|
readlinkat(2), lstat(2), chmod(2), fchmod(2),
|
||||||
|
fchmodat(2), chflags(2), chflagsat(2), chown(2),
|
||||||
|
fchown(2), fchownat(2), fstat(2)
|
||||||
|
|
||||||
|
ccppaatthh A number of system calls and sub-modes are allowed,
|
||||||
|
which may create new files or directories in the
|
||||||
|
filesystem:
|
||||||
|
|
||||||
|
rename(2), renameat(2), link(2), linkat(2), symlink(2),
|
||||||
|
symlinkat(2), unlink(2), unlinkat(2), mkdir(2),
|
||||||
|
mkdirat(2), rmdir(2)
|
||||||
|
|
||||||
|
ddppaatthh A number of system calls are allowed to create special
|
||||||
|
files:
|
||||||
|
|
||||||
|
mkfifo(2), mknod(2)
|
||||||
|
|
||||||
|
ttmmppppaatthh A number of system calls are allowed to do operations in
|
||||||
|
the _/_t_m_p directory, including create, read, or write:
|
||||||
|
|
||||||
|
lstat(2), chmod(2), chflags(2), chown(2), unlink(2),
|
||||||
|
fstat(2)
|
||||||
|
|
||||||
|
iinneett The following system calls are allowed to operate in the
|
||||||
|
AF_INET and AF_INET6 domains (though setsockopt(2) has
|
||||||
|
been substantially reduced in functionality):
|
||||||
|
|
||||||
|
socket(2), listen(2), bind(2), connect(2), accept4(2),
|
||||||
|
accept(2), getpeername(2), getsockname(2),
|
||||||
|
setsockopt(2), getsockopt(2)
|
||||||
|
|
||||||
|
mmccaasstt In combination with iinneett give back functionality to
|
||||||
|
setsockopt(2) for operating on multicast sockets.
|
||||||
|
|
||||||
|
ffaattttrr The following system calls are allowed to make explicit
|
||||||
|
changes to fields in _s_t_r_u_c_t _s_t_a_t relating to a file:
|
||||||
|
|
||||||
|
utimes(2), futimes(2), utimensat(2), futimens(2),
|
||||||
|
chmod(2), fchmod(2), fchmodat(2), chflags(2),
|
||||||
|
chflagsat(2), chown(2), fchownat(2), lchown(2),
|
||||||
|
fchown(2), utimes(2)
|
||||||
|
|
||||||
|
cchhoowwnn The chown(2) family is allowed to change the user or
|
||||||
|
group on a file.
|
||||||
|
|
||||||
|
fflloocckk File locking via fcntl(2), flock(2), lockf(3), and
|
||||||
|
open(2) is allowed. No distinction is made between
|
||||||
|
shared and exclusive locks. This promise is required
|
||||||
|
for unlock as well as lock.
|
||||||
|
|
||||||
|
uunniixx The following system calls are allowed to operate in the
|
||||||
|
AF_UNIX domain:
|
||||||
|
|
||||||
|
socket(2), listen(2), bind(2), connect(2), accept4(2),
|
||||||
|
accept(2), getpeername(2), getsockname(2),
|
||||||
|
setsockopt(2), getsockopt(2)
|
||||||
|
|
||||||
|
ddnnss Subsequent to a successful open(2) of _/_e_t_c_/_r_e_s_o_l_v_._c_o_n_f,
|
||||||
|
a few system calls become able to allow DNS network
|
||||||
|
transactions:
|
||||||
|
|
||||||
|
sendto(2), recvfrom(2), socket(2), connect(2)
|
||||||
|
|
||||||
|
ggeettppww This allows read-only opening of files in _/_e_t_c for the
|
||||||
|
getpwnam(3), getgrnam(3), getgrouplist(3), and
|
||||||
|
initgroups(3) family of functions, including lookups via
|
||||||
|
the yp(8) protocol for YP and LDAP databases.
|
||||||
|
|
||||||
|
sseennddffdd Allows sending of file descriptors using sendmsg(2).
|
||||||
|
File descriptors referring to directories may not be
|
||||||
|
passed.
|
||||||
|
|
||||||
|
rreeccvvffdd Allows receiving of file descriptors using recvmsg(2).
|
||||||
|
File descriptors referring to directories may not be
|
||||||
|
passed.
|
||||||
|
|
||||||
|
ttaappee Allow MTIOCGET and MTIOCTOP operations against tape
|
||||||
|
drives.
|
||||||
|
|
||||||
|
ttttyy In addition to allowing read-write operations on
|
||||||
|
_/_d_e_v_/_t_t_y, this opens up a variety of ioctl(2) requests
|
||||||
|
used by tty devices. If ttttyy is accompanied with rrppaatthh,
|
||||||
|
revoke(2) is permitted. Otherwise only the following
|
||||||
|
ioctl(2) requests are permitted:
|
||||||
|
|
||||||
|
TIOCSPGRP, TIOCGETA, TIOCGPGRP, TIOCGWINSZ, TIOCSWINSZ,
|
||||||
|
TIOCSBRK, TIOCCDTR, TIOCSETA, TIOCSETAW, TIOCSETAF,
|
||||||
|
TIOCUCNTL
|
||||||
|
|
||||||
|
pprroocc Allows the following process relationship operations:
|
||||||
|
|
||||||
|
fork(2), vfork(2), kill(2), getpriority(2),
|
||||||
|
setpriority(2), setrlimit(2), setpgid(2), setsid(2)
|
||||||
|
|
||||||
|
eexxeecc Allows a process to call execve(2). Coupled with the
|
||||||
|
pprroocc promise, this allows a process to fork and execute
|
||||||
|
another program. If _e_x_e_c_p_r_o_m_i_s_e_s has been previously
|
||||||
|
set the new program begins with those promises, unless
|
||||||
|
setuid/setgid bits are set in which case execution is
|
||||||
|
blocked with EACCES. Otherwise the new program starts
|
||||||
|
running without pledge active, and hopefully makes a new
|
||||||
|
pledge soon.
|
||||||
|
|
||||||
|
pprroott__eexxeecc Allows the use of PROT_EXEC with mmap(2) and
|
||||||
|
mprotect(2).
|
||||||
|
|
||||||
|
sseettttiimmee Allows the setting of system time, via the
|
||||||
|
settimeofday(2), adjtime(2), and adjfreq(2) system
|
||||||
|
calls.
|
||||||
|
|
||||||
|
ppss Allows enough sysctl(2) interfaces to allow inspection
|
||||||
|
of processes operating on the system using programs like
|
||||||
|
ps(1).
|
||||||
|
|
||||||
|
vvmmiinnffoo Allows enough sysctl(2) interfaces to allow inspection
|
||||||
|
of the system's virtual memory by programs like top(1)
|
||||||
|
and vmstat(8).
|
||||||
|
|
||||||
|
iidd Allows the following system calls which can change the
|
||||||
|
rights of a process:
|
||||||
|
|
||||||
|
setuid(2), seteuid(2), setreuid(2), setresuid(2),
|
||||||
|
setgid(2), setegid(2), setregid(2), setresgid(2),
|
||||||
|
setgroups(2), setlogin(2), setrlimit(2), getpriority(2),
|
||||||
|
setpriority(2), setrtable(2)
|
||||||
|
|
||||||
|
ppff Allows a subset of ioctl(2) operations on the pf(4)
|
||||||
|
device:
|
||||||
|
|
||||||
|
DIOCADDRULE, DIOCGETSTATUS, DIOCNATLOOK, DIOCRADDTABLES,
|
||||||
|
DIOCRCLRADDRS, DIOCRCLRTABLES, DIOCRCLRTSTATS,
|
||||||
|
DIOCRGETTSTATS, DIOCRSETADDRS, DIOCXBEGIN, DIOCXCOMMIT
|
||||||
|
|
||||||
|
rroouuttee Allow inspection of the routing table.
|
||||||
|
|
||||||
|
wwrroouuttee Allow changes to the routing table.
|
||||||
|
|
||||||
|
aauuddiioo Allows a subset of ioctl(2) operations on audio(4)
|
||||||
|
devices (see sio_open(3) for more information):
|
||||||
|
|
||||||
|
AUDIO_GETPOS, AUDIO_GETPAR, AUDIO_SETPAR, AUDIO_START,
|
||||||
|
AUDIO_STOP, AUDIO_MIXER_DEVINFO, AUDIO_MIXER_READ,
|
||||||
|
AUDIO_MIXER_WRITE
|
||||||
|
|
||||||
|
vviiddeeoo Allows a subset of ioctl(2) operations on video(4)
|
||||||
|
devices:
|
||||||
|
|
||||||
|
VIDIOC_DQBUF, VIDIOC_ENUM_FMT,
|
||||||
|
VIDIOC_ENUM_FRAMEINTERVALS, VIDIOC_ENUM_FRAMESIZES,
|
||||||
|
VIDIOC_G_CTRL, VIDIOC_G_PARM, VIDIOC_QBUF,
|
||||||
|
VIDIOC_QUERYBUF, VIDIOC_QUERYCAP, VIDIOC_QUERYCTRL,
|
||||||
|
VIDIOC_S_CTRL, VIDIOC_S_FMT, VIDIOC_S_PARM,
|
||||||
|
VIDIOC_STREAMOFF, VIDIOC_STREAMON, VIDIOC_TRY_FMT,
|
||||||
|
VIDIOC_REQBUFS
|
||||||
|
|
||||||
|
bbppff Allow BIOCGSTATS operation for statistics collection
|
||||||
|
from a bpf(4) device.
|
||||||
|
|
||||||
|
uunnvveeiill Allow unveil(2) to be called.
|
||||||
|
|
||||||
|
eerrrroorr Rather than killing the process upon violation, indicate
|
||||||
|
error with ENOSYS.
|
||||||
|
|
||||||
|
Also when pplleeddggee() is called with higher _p_r_o_m_i_s_e_s or
|
||||||
|
_e_x_e_c_p_r_o_m_i_s_e_s, those changes will be ignored and return
|
||||||
|
success. This is useful when a parent enforces
|
||||||
|
_e_x_e_c_p_r_o_m_i_s_e_s but an execve'd child has a different idea.
|
||||||
|
|
||||||
|
RREETTUURRNN VVAALLUUEESS
|
||||||
|
Upon successful completion, the value 0 is returned; otherwise the
|
||||||
|
value -1 is returned and the global variable _e_r_r_n_o is set to indicate the
|
||||||
|
error.
|
||||||
|
|
||||||
|
EERRRROORRSS
|
||||||
|
pplleeddggee() will fail if:
|
||||||
|
|
||||||
|
[EFAULT] _p_r_o_m_i_s_e_s or _e_x_e_c_p_r_o_m_i_s_e_s points outside the process's
|
||||||
|
allocated address space.
|
||||||
|
|
||||||
|
[EINVAL] _p_r_o_m_i_s_e_s is malformed or contains invalid keywords.
|
||||||
|
|
||||||
|
[EPERM] This process is attempting to increase permissions.
|
||||||
|
|
||||||
|
HHIISSTTOORRYY
|
||||||
|
The pplleeddggee() system call first appeared in OpenBSD 5.9.
|
||||||
|
|
||||||
|
OpenBSD 7.6 September 17, 2024 OpenBSD 7.6
|
81
openbsd-pledge-unveil/unveil.txt
Normal file
81
openbsd-pledge-unveil/unveil.txt
Normal file
@ -0,0 +1,81 @@
|
|||||||
|
UNVEIL(2) System Calls Manual UNVEIL(2)
|
||||||
|
|
||||||
|
NNAAMMEE
|
||||||
|
uunnvveeiill - unveil parts of a restricted filesystem view
|
||||||
|
|
||||||
|
SSYYNNOOPPSSIISS
|
||||||
|
##iinncclluuddee <<uunniissttdd..hh>>
|
||||||
|
|
||||||
|
_i_n_t
|
||||||
|
uunnvveeiill(_c_o_n_s_t _c_h_a_r _*_p_a_t_h, _c_o_n_s_t _c_h_a_r _*_p_e_r_m_i_s_s_i_o_n_s);
|
||||||
|
|
||||||
|
DDEESSCCRRIIPPTTIIOONN
|
||||||
|
The first call to uunnvveeiill() that specifies a _p_a_t_h removes visibility of
|
||||||
|
the entire filesystem from all other filesystem-related system calls
|
||||||
|
(such as open(2), chmod(2) and rename(2)), except for the specified _p_a_t_h
|
||||||
|
and _p_e_r_m_i_s_s_i_o_n_s.
|
||||||
|
|
||||||
|
The uunnvveeiill() system call remains capable of traversing to any _p_a_t_h in the
|
||||||
|
filesystem, so additional calls can set permissions at other points in
|
||||||
|
the filesystem hierarchy.
|
||||||
|
|
||||||
|
After establishing a collection of _p_a_t_h and _p_e_r_m_i_s_s_i_o_n_s rules, future
|
||||||
|
calls to uunnvveeiill() can be disabled by passing two NULL arguments.
|
||||||
|
Alternatively, pledge(2) may be used to remove the "unveil" promise.
|
||||||
|
|
||||||
|
The _p_e_r_m_i_s_s_i_o_n_s argument points to a string consisting of zero or more of
|
||||||
|
the following characters:
|
||||||
|
|
||||||
|
rr Make _p_a_t_h available for read operations, corresponding to the
|
||||||
|
pledge(2) promise "rpath".
|
||||||
|
ww Make _p_a_t_h available for write operations, corresponding to
|
||||||
|
the pledge(2) promise "wpath".
|
||||||
|
xx Make _p_a_t_h available for execute operations, corresponding to
|
||||||
|
the pledge(2) promise "exec".
|
||||||
|
cc Allow _p_a_t_h to be created and removed, corresponding to the
|
||||||
|
pledge(2) promise "cpath".
|
||||||
|
|
||||||
|
A _p_a_t_h that is a directory will enable all filesystem access underneath
|
||||||
|
_p_a_t_h using _p_e_r_m_i_s_s_i_o_n_s if and only if no more specific matching uunnvveeiill()
|
||||||
|
exists at a lower level. Directories are remembered at the time of a
|
||||||
|
call to uunnvveeiill(). This means that a directory that is removed and
|
||||||
|
recreated after a call to uunnvveeiill() will appear to not exist.
|
||||||
|
|
||||||
|
Non-directory paths are remembered by name within their containing
|
||||||
|
directory, and so may be created, removed, or re-created after a call to
|
||||||
|
uunnvveeiill() and still appear to exist.
|
||||||
|
|
||||||
|
Attempts to access paths not allowed by uunnvveeiill() will result in an error
|
||||||
|
of EACCES when the _p_e_r_m_i_s_s_i_o_n_s argument does not match the attempted
|
||||||
|
operation. ENOENT is returned for paths for which no uunnvveeiill()
|
||||||
|
permissions qualify. After a process has terminated, lastcomm(1) will
|
||||||
|
mark it with the `U' flag if file access was prevented by uunnvveeiill().
|
||||||
|
|
||||||
|
uunnvveeiill() use can be tricky because programs misbehave badly when their
|
||||||
|
files unexpectedly disappear. In many cases it is easier to unveil the
|
||||||
|
directories in which an application makes use of files.
|
||||||
|
|
||||||
|
RREETTUURRNN VVAALLUUEESS
|
||||||
|
Upon successful completion, the value 0 is returned; otherwise the
|
||||||
|
value -1 is returned and the global variable _e_r_r_n_o is set to indicate the
|
||||||
|
error.
|
||||||
|
|
||||||
|
EERRRROORRSS
|
||||||
|
[E2BIG] The addition of _p_a_t_h would exceed the per-process
|
||||||
|
limit for unveiled paths.
|
||||||
|
|
||||||
|
[EFAULT] _p_a_t_h or _p_e_r_m_i_s_s_i_o_n_s points outside the process's
|
||||||
|
allocated address space.
|
||||||
|
|
||||||
|
[ENOENT] A directory in _p_a_t_h did not exist.
|
||||||
|
|
||||||
|
[EINVAL] An invalid value of _p_e_r_m_i_s_s_i_o_n_s was used.
|
||||||
|
|
||||||
|
[EPERM] An attempt to increase permissions was made, or the
|
||||||
|
_p_a_t_h was not accessible, or uunnvveeiill() was called after
|
||||||
|
locking.
|
||||||
|
|
||||||
|
HHIISSTTOORRYY
|
||||||
|
The uunnvveeiill() system call first appeared in OpenBSD 6.4.
|
||||||
|
|
||||||
|
OpenBSD 7.6 September 6, 2021 OpenBSD 7.6
|
Loading…
Reference in New Issue
Block a user