#!/sbin/sh # # CDDL HEADER START # # The contents of this file are subject to the terms of the # Common Development and Distribution License (the "License"). # You may not use this file except in compliance with the License. # # You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE # or http://www.opensolaris.org/os/licensing. # See the License for the specific language governing permissions # and limitations under the License. # # When distributing Covered Code, include this CDDL HEADER in each # file and include the License file at usr/src/OPENSOLARIS.LICENSE. # If applicable, add the following below this CDDL HEADER, with the # fields enclosed by brackets "[]" replaced with your own identifying # information: Portions Copyright [yyyy] [name of copyright owner] # # CDDL HEADER END # # Copyright 2008 Sun Microsystems, Inc. All rights reserved. # Use is subject to license terms. # #ident "%Z%%M% %I% %E% SMI" . /lib/svc/share/smf_include.sh ROOT_PATH="" if [ $# -gt 1 ]; then if [ $# -ne 3 -o "$2" != "-R" ]; then echo "$0: invalid syntax" exit $SMF_EXIT_ERR_CONFIG fi if [ "$3" != "/" ]; then ROOT_PATH=$3 fi fi if [ -n "$ROOT_PATH" -a "$1" != "start" ]; then echo "$0: invalid syntax: -R allowed for start method only" exit $SMF_EXIT_ERR_CONFIG fi if [ -n "$ROOT_PATH" -a ! -d "$ROOT_PATH" ]; then echo "$0: invalid -R rootpath dir specified" exit $SMF_EXIT_ERR_CONFIG fi if smf_is_nonglobalzone; then echo "$0: not supported in a local zone" exit $SMF_EXIT_ERR_CONFIG fi rewrite_logindev() { from="$1" to="$2" # Comment out audio, usb, removable-media, and hotpluggable device # entries in /etc/logindevperm. LOGINDEVPERM=$ROOT_PATH/etc/logindevperm if [ ! -f $LOGINDEVPERM ]; then return fi for line in \ "/dev/console 0600 /dev/sound/" \ "/dev/console 0400 /dev/removable-media/" \ "/dev/console 0400 /dev/hotpluggable/" \ "/dev/console 0600 /dev/usb/\[0-9a-f\]" \ ; do sed -e "s!^$from$line!$to$line!" $LOGINDEVPERM > /tmp/tmp.$$ cp /tmp/tmp.$$ $LOGINDEVPERM done rm -f /tmp/tmp.$$ } do_logindev() { rewrite_logindev "" "#" } do_otherservices() { # Setup dependent services cat >> $ROOT_PATH/var/svc/profile/upgrade <<\__ENABLE_OTHERS /usr/sbin/svcadm enable -s svc:/network/tnd:default /usr/sbin/svcadm enable -s svc:/system/tsol-zones:default /usr/sbin/svccfg -s svc:/application/x11/x11-server \ setprop options/tcp_listen = true /usr/sbin/svcadm enable svc:/network/rpc/rstat:default __ENABLE_OTHERS } do_bsmconv() { # Run bsmconv so audit and device allocation is enabled by # default with Trusted Extensions. if [ "$ROOT_PATH" = "/" -o "$ROOT_PATH" = "" ]; then BSMDIR="" else BSMDIR=$ROOT_PATH fi echo "Running bsmconv ..." echo `TEXTDOMAIN="SUNW_OST_OSCMD" gettext "y"` | \ $ROOT_PATH/etc/security/bsmconv $ROOT_PATH } do_nscd() { # For Trusted Extensions, make nscd service transient in local zones. cat >> $ROOT_PATH/var/svc/profile/upgrade <<\_DEL_LOCAL_NSCD if [ `/sbin/zonename` != "global" ]; then nscd="svc:/system/name-service-cache" duration="" if /bin/svcprop -q -c -p startd/duration $nscd ; then duration=`/bin/svcprop -c -p startd/duration $nscd` fi if [ "$duration" != "transient" ]; then /usr/sbin/svccfg -s $nscd addpg startd framework /usr/sbin/svccfg -s $nscd setprop \ startd/duration = astring: transient /usr/sbin/svccfg -s $nscd setprop stop/exec = :true /usr/sbin/svcadm refresh $nscd fi fi _DEL_LOCAL_NSCD } do_bootupd() { if [ -f $ROOT_PATH/platform/`/sbin/uname -m`/boot_archive ]; then if [ -z "$ROOT_PATH" -o "$ROOT_PATH" = "/" ]; then /sbin/bootadm update-archive else /sbin/bootadm update-archive -R $ROOT_PATH fi fi } setup_tx_changes(){ # # No comments or blanks lines allowed in entries below # cat > ${TX_ENTRIES} << EOF dtlogin account requisite pam_roles.so.1 dtlogin account required pam_unix_account.so.1 dtsession account requisite pam_roles.so.1 dtsession account required pam_unix_account.so.1 gdm account requisite pam_roles.so.1 gdm account required pam_unix_account.so.1 xscreensaver account requisite pam_roles.so.1 xscreensaver account required pam_unix_account.so.1 passwd account requisite pam_roles.so.1 passwd account required pam_unix_account.so.1 dtpasswd account requisite pam_roles.so.1 dtpasswd account required pam_unix_account.so.1 tsoljds-tstripe account requisite pam_roles.so.1 tsoljds-tstripe account required pam_unix_account.so.1 other account required pam_tsol_account.so.1 EOF } do_addpam() { PAM_TMP=/tmp/pam_conf.$$ TX_ENTRIES=$PAM_TMP/sct.$$ PAM_DEST=$ROOT_PATH/etc/pam.conf mkdir $PAM_TMP || exit $SMF_EXIT_ERR_FATAL setup_tx_changes # verify that pam.conf file exists... if [ ! -f ${PAM_DEST} ]; then echo "$0: ${PAM_DEST} not found; aborting" exit $SMF_EXIT_ERR_FATAL fi # # Update pam.conf to append Trusted Extensions entries if not # already present. # rm -f /tmp/pamconf.$$ while read e1 e2 e3 e4 e5 do # If this is the 'other' entry, add it unless it already # exists. if [ $e1 = "other" ]; then grep \ "^[# ]*$e1[ ][ ]*$e2[ ][ ]*$e3[ ][ ]*$e4" \ $PAM_DEST >/dev/null 2>&1 if [ $? = 1 ] ; then # Doesn't exist, enter into pam.conf echo "$e1\t$e2 $e3\t\t$e4 $e5" \ >> /tmp/pamconf.$$ fi else # Add other entries unless they already have a # stack of their own. grep "^[# ]*$e1[ ][ ]*$e2[ ]" \ $PAM_DEST >/dev/null 2>&1 if [ $? = 1 ] ; then echo "$e1\t$e2 $e3\t\t$e4 $e5" \ >> /tmp/pamconf.$$ fi fi done < ${TX_ENTRIES} # Append TX lines if any were not present already. if [ -f /tmp/pamconf.$$ ] ; then echo "# Entries for Trusted Extensions" >> $PAM_DEST cat /tmp/pamconf.$$ >> $PAM_DEST echo "$0: updating $PAM_DEST entries for Trusted Extensions;" echo "$0: please examine/update any new entries" rm -f /tmp/pamconf.$$ fi rm -rf $PAM_TMP } do_pamremove() { PAM_TMP=/tmp/pam_conf.$$ TX_ENTRIES=$PAM_TMP/sct.$$ PAM_DEST=$ROOT_PATH/etc/pam.conf TMPFILE=$PAM_TMP/pam.conf mkdir $PAM_TMP || exit $SMF_EXIT_ERR_FATAL # verify that pam.conf file exists... if [ ! -f ${PAM_DEST} ]; then echo "$0: ${PAM_DEST} not found; aborting" exit $SMF_EXIT_ERR_FATAL fi grep '^[a-z].*pam_tsol_account' $PAM_DEST > /dev/null 2>&1 if [ $? -ne 0 ]; then echo "$0: pam_tsol_account module not present," echo "$0: No changes were made to $PAM_DEST." return fi grep -v pam_tsol_account $PAM_DEST > $TMPFILE echo "$0: $PAM_DEST "tsol" entries removed" cp $TMPFILE $PAM_DEST rm -rf $PAM_TMP } do_commonstart() { echo "$0: Updating $ROOT_PATH/etc/system..." if [ ! -f ${ROOT_PATH}/etc/system ]; then touch ${ROOT_PATH}/etc/system fi # Set sys_labeling in etc/system grep -v "sys_labeling=" ${ROOT_PATH}/etc/system > /tmp/etc.system.$$ echo "set sys_labeling=1" >> /tmp/etc.system.$$ mv /tmp/etc.system.$$ ${ROOT_PATH}/etc/system grep "set sys_labeling=1" ${ROOT_PATH}/etc/system > /dev/null 2>&1 if [ $? -ne 0 ]; then echo "$0: ERROR: cannot set sys_labeling in $ROOT_PATH/etc/system" exit $SMF_EXIT_ERR_FATAL fi # Setup dependent services do_otherservices do_logindev do_bsmconv do_nscd do_addpam do_bootupd } daemon_start() { # If a labeld door exists, check for a labeld process and exit # if the daemon is already running. if [ -r /var/tsol/doors/labeld ]; then if /usr/bin/pgrep -x -u 0 -P 1 labeld >/dev/null 2>&1; then echo "$0: labeld is already running" exit $SMF_EXIT_ERR_FATAL fi fi /usr/bin/rm -f /var/tsol/doors/labeld /usr/lib/labeld } PATH=/usr/sbin:/usr/bin; export PATH case "$1" in 'start') if [ -z "$ROOT_PATH" -o "$ROOT_PATH" = "/" ]; then # native if [ -z "$SMF_FMRI" ]; then echo "$0: this script can only be invoked by smf(5)" exit $SMF_EXIT_ERR_NOSMF fi tx_enabled=`/usr/bin/svcprop -c -p general/enabled $SMF_FMRI` if [ "$tx_enabled" = "false" ]; then # A sign of trying temporary enablement...no-no echo "$0: Temporarily enabling Trusted Extensions is not allowed." exit $SMF_EXIT_ERR_CONFIG fi if (smf_is_system_labeled); then daemon_start exit $SMF_EXIT_OK fi # Make changes to enable Trusted Extensions grep "^set sys_labeling=1" ${ROOT_PATH}/etc/system > /dev/null 2>&1 if [ $? -eq 0 ]; then echo "$0: already enabled. Exiting." exit $SMF_EXIT_OK fi if [ "`/usr/sbin/zoneadm list -c`" != "global" ]; then echo "$0: Must remove zones before enabling Trusted Extensions." exit $SMF_EXIT_ERR_CONFIG fi do_commonstart # start daemon proccess so our service doesn't go into # maintenance state daemon_start echo "$0: Started. Must reboot and configure Trusted Extensions." else # Support jumpstart etc # Make changes to enable Trusted Extensions grep "^set sys_labeling=1" ${ROOT_PATH}/etc/system > /dev/null 2>&1 if [ $? -eq 0 ]; then echo "$0: already enabled. Exiting." exit $SMF_EXIT_OK fi # Setup dependent services cat >> $ROOT_PATH/var/svc/profile/upgrade <<\__TRUSTED_ENABLE /usr/sbin/svcadm enable -s svc:/system/labeld:default __TRUSTED_ENABLE do_commonstart echo "$0: Started. Must configure Trusted Extensions before booting." fi ;; 'stop') tx_enabled=`/usr/bin/svcprop -c -p general/enabled $SMF_FMRI` if [ "$tx_enabled" = "true" ]; then /usr/bin/pkill -x -u 0 -P 1 -z `smf_zonename` labeld exit $SMF_EXIT_OK fi if [ "`/usr/sbin/zoneadm list -c`" != "global" ]; then echo "$0: Must remove zones before disabling Trusted Extensions." exit $SMF_EXIT_ERR_CONFIG fi # Stop Trusted services. /usr/sbin/svcadm disable svc:/system/tsol-zones:default 2>/dev/null /usr/sbin/svcadm disable svc:/network/tnd:default 2>/dev/null # Uncomment audio, usb, removable-media, and hotpluggable device # entries in /etc/logindevperm. rewrite_logindev "#" "" # Remove sys_labeling from /etc/system grep -v "sys_labeling" ${ROOT_PATH}/etc/system > /tmp/etc.system.$$ mv /tmp/etc.system.$$ ${ROOT_PATH}/etc/system grep "sys_labeling" ${ROOT_PATH}/etc/system > /dev/null 2>&1 if [ $? -eq 0 ]; then echo "$0: ERROR: cannot remove sys_labeling in $ROOT_PATH/etc/system" exit $SMF_EXIT_ERR_FATAL fi do_pamremove do_bootupd /usr/bin/pkill -x -u 0 -P 1 -z `smf_zonename` labeld echo "$0: Stopped. Will take effect at next boot." ;; *) echo "Usage: $0 { start | stop }" exit 1 ;; esac exit $SMF_EXIT_OK