xref: /freebsd/crypto/openssh/openbsd-compat/port-solaris.c (revision 62cfcf62f627e5093fb37026a6d8c98e4d2ef04c)
1 /*
2  * Copyright (c) 2006 Chad Mynhier.
3  *
4  * Permission to use, copy, modify, and distribute this software for any
5  * purpose with or without fee is hereby granted, provided that the above
6  * copyright notice and this permission notice appear in all copies.
7  *
8  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15  */
16 
17 #include "config.h"
18 #include "includes.h"
19 
20 #ifdef USE_SOLARIS_PROCESS_CONTRACTS
21 
22 #include <sys/types.h>
23 #include <sys/stat.h>
24 #include <sys/param.h>
25 
26 #include <errno.h>
27 #ifdef HAVE_FCNTL_H
28 # include <fcntl.h>
29 #endif
30 #include <stdarg.h>
31 #include <string.h>
32 #include <unistd.h>
33 
34 #include <libcontract.h>
35 #include <sys/contract/process.h>
36 #include <sys/ctfs.h>
37 
38 #include "log.h"
39 
40 #define CT_TEMPLATE	CTFS_ROOT "/process/template"
41 #define CT_LATEST	CTFS_ROOT "/process/latest"
42 
43 static int tmpl_fd = -1;
44 
45 /* Lookup the latest process contract */
46 static ctid_t
47 get_active_process_contract_id(void)
48 {
49 	int stat_fd;
50 	ctid_t ctid = -1;
51 	ct_stathdl_t stathdl;
52 
53 	if ((stat_fd = open64(CT_LATEST, O_RDONLY)) == -1) {
54 		error("%s: Error opening 'latest' process "
55 		    "contract: %s", __func__, strerror(errno));
56 		return -1;
57 	}
58 	if (ct_status_read(stat_fd, CTD_COMMON, &stathdl) != 0) {
59 		error("%s: Error reading process contract "
60 		    "status: %s", __func__, strerror(errno));
61 		goto out;
62 	}
63 	if ((ctid = ct_status_get_id(stathdl)) < 0) {
64 		error("%s: Error getting process contract id: %s",
65 		    __func__, strerror(errno));
66 		goto out;
67 	}
68 
69 	ct_status_free(stathdl);
70  out:
71 	close(stat_fd);
72 	return ctid;
73 }
74 
75 void
76 solaris_contract_pre_fork(void)
77 {
78 	if ((tmpl_fd = open64(CT_TEMPLATE, O_RDWR)) == -1) {
79 		error("%s: open %s: %s", __func__,
80 		    CT_TEMPLATE, strerror(errno));
81 		return;
82 	}
83 
84 	debug2("%s: setting up process contract template on fd %d",
85 	    __func__, tmpl_fd);
86 
87 	/* First we set the template parameters and event sets. */
88 	if (ct_pr_tmpl_set_param(tmpl_fd, CT_PR_PGRPONLY) != 0) {
89 		error("%s: Error setting process contract parameter set "
90 		    "(pgrponly): %s", __func__, strerror(errno));
91 		goto fail;
92 	}
93 	if (ct_pr_tmpl_set_fatal(tmpl_fd, CT_PR_EV_HWERR) != 0) {
94 		error("%s: Error setting process contract template "
95 		    "fatal events: %s", __func__, strerror(errno));
96 		goto fail;
97 	}
98 	if (ct_tmpl_set_critical(tmpl_fd, 0) != 0) {
99 		error("%s: Error setting process contract template "
100 		    "critical events: %s", __func__, strerror(errno));
101 		goto fail;
102 	}
103 	if (ct_tmpl_set_informative(tmpl_fd, CT_PR_EV_HWERR) != 0) {
104 		error("%s: Error setting process contract template "
105 		    "informative events: %s", __func__, strerror(errno));
106 		goto fail;
107 	}
108 
109 	/* Now make this the active template for this process. */
110 	if (ct_tmpl_activate(tmpl_fd) != 0) {
111 		error("%s: Error activating process contract "
112 		    "template: %s", __func__, strerror(errno));
113 		goto fail;
114 	}
115 	return;
116 
117  fail:
118 	if (tmpl_fd != -1) {
119 		close(tmpl_fd);
120 		tmpl_fd = -1;
121 	}
122 }
123 
124 void
125 solaris_contract_post_fork_child()
126 {
127 	debug2("%s: clearing process contract template on fd %d",
128 	    __func__, tmpl_fd);
129 
130 	/* Clear the active template. */
131 	if (ct_tmpl_clear(tmpl_fd) != 0)
132 		error("%s: Error clearing active process contract "
133 		    "template: %s", __func__, strerror(errno));
134 
135 	close(tmpl_fd);
136 	tmpl_fd = -1;
137 }
138 
139 void
140 solaris_contract_post_fork_parent(pid_t pid)
141 {
142 	ctid_t ctid;
143 	char ctl_path[256];
144 	int r, ctl_fd = -1, stat_fd = -1;
145 
146 	debug2("%s: clearing template (fd %d)", __func__, tmpl_fd);
147 
148 	if (tmpl_fd == -1)
149 		return;
150 
151 	/* First clear the active template. */
152 	if ((r = ct_tmpl_clear(tmpl_fd)) != 0)
153 		error("%s: Error clearing active process contract "
154 		    "template: %s", __func__, strerror(errno));
155 
156 	close(tmpl_fd);
157 	tmpl_fd = -1;
158 
159 	/*
160 	 * If either the fork didn't succeed (pid < 0), or clearing
161 	 * th active contract failed (r != 0), then we have nothing
162 	 * more do.
163 	 */
164 	if (r != 0 || pid <= 0)
165 		return;
166 
167 	/* Now lookup and abandon the contract we've created. */
168 	ctid = get_active_process_contract_id();
169 
170 	debug2("%s: abandoning contract id %ld", __func__, ctid);
171 
172 	snprintf(ctl_path, sizeof(ctl_path),
173 	    CTFS_ROOT "/process/%ld/ctl", ctid);
174 	if ((ctl_fd = open64(ctl_path, O_WRONLY)) < 0) {
175 		error("%s: Error opening process contract "
176 		    "ctl file: %s", __func__, strerror(errno));
177 		goto fail;
178 	}
179 	if (ct_ctl_abandon(ctl_fd) < 0) {
180 		error("%s: Error abandoning process contract: %s",
181 		    __func__, strerror(errno));
182 		goto fail;
183 	}
184 	close(ctl_fd);
185 	return;
186 
187  fail:
188 	if (tmpl_fd != -1) {
189 		close(tmpl_fd);
190 		tmpl_fd = -1;
191 	}
192 	if (stat_fd != -1)
193 		close(stat_fd);
194 	if (ctl_fd != -1)
195 		close(ctl_fd);
196 }
197 #endif
198 
199 #ifdef USE_SOLARIS_PROJECTS
200 #include <sys/task.h>
201 #include <project.h>
202 
203 /*
204  * Get/set solaris default project.
205  * If we fail, just run along gracefully.
206  */
207 void
208 solaris_set_default_project(struct passwd *pw)
209 {
210 	struct project  *defaultproject;
211 	struct project   tempproject;
212 	char buf[1024];
213 
214 	/* get default project, if we fail just return gracefully  */
215 	if ((defaultproject = getdefaultproj(pw->pw_name, &tempproject, &buf,
216 	    sizeof(buf))) != NULL) {
217 		/* set default project */
218 		if (setproject(defaultproject->pj_name, pw->pw_name,
219 		    TASK_NORMAL) != 0)
220 			debug("setproject(%s): %s", defaultproject->pj_name,
221 			    strerror(errno));
222 	} else {
223 		/* debug on getdefaultproj() error */
224 		debug("getdefaultproj(%s): %s", pw->pw_name, strerror(errno));
225 	}
226 }
227 #endif /* USE_SOLARIS_PROJECTS */
228 
229 #ifdef USE_SOLARIS_PRIVS
230 # ifdef HAVE_PRIV_H
231 #  include <priv.h>
232 # endif
233 
234 priv_set_t *
235 solaris_basic_privset(void)
236 {
237 	priv_set_t *pset;
238 
239 #ifdef HAVE_PRIV_BASICSET
240 	if ((pset = priv_allocset()) == NULL) {
241 		error("priv_allocset: %s", strerror(errno));
242 		return NULL;
243 	}
244 	priv_basicset(pset);
245 #else
246 	if ((pset = priv_str_to_set("basic", ",", NULL)) == NULL) {
247 		error("priv_str_to_set: %s", strerror(errno));
248 		return NULL;
249 	}
250 #endif
251 	return pset;
252 }
253 
254 void
255 solaris_drop_privs_pinfo_net_fork_exec(void)
256 {
257 	priv_set_t *pset = NULL, *npset = NULL;
258 
259 	/*
260 	 * Note: this variant avoids dropping DAC filesystem rights, in case
261 	 * the process calling it is running as root and should have the
262 	 * ability to read/write/chown any file on the system.
263 	 *
264 	 * We start with the basic set, then *add* the DAC rights to it while
265 	 * taking away other parts of BASIC we don't need. Then we intersect
266 	 * this with our existing PERMITTED set. In this way we keep any
267 	 * DAC rights we had before, while otherwise reducing ourselves to
268 	 * the minimum set of privileges we need to proceed.
269 	 *
270 	 * This also means we drop any other parts of "root" that we don't
271 	 * need (e.g. the ability to kill any process, create new device nodes
272 	 * etc etc).
273 	 */
274 
275 	if ((pset = priv_allocset()) == NULL)
276 		fatal("priv_allocset: %s", strerror(errno));
277 	if ((npset = solaris_basic_privset()) == NULL)
278 		fatal("solaris_basic_privset: %s", strerror(errno));
279 
280 	if (priv_addset(npset, PRIV_FILE_CHOWN) != 0 ||
281 	    priv_addset(npset, PRIV_FILE_DAC_READ) != 0 ||
282 	    priv_addset(npset, PRIV_FILE_DAC_SEARCH) != 0 ||
283 	    priv_addset(npset, PRIV_FILE_DAC_WRITE) != 0 ||
284 	    priv_addset(npset, PRIV_FILE_OWNER) != 0)
285 		fatal("priv_addset: %s", strerror(errno));
286 
287 	if (priv_delset(npset, PRIV_FILE_LINK_ANY) != 0 ||
288 #ifdef PRIV_NET_ACCESS
289 	    priv_delset(npset, PRIV_NET_ACCESS) != 0 ||
290 #endif
291 	    priv_delset(npset, PRIV_PROC_EXEC) != 0 ||
292 	    priv_delset(npset, PRIV_PROC_FORK) != 0 ||
293 	    priv_delset(npset, PRIV_PROC_INFO) != 0 ||
294 	    priv_delset(npset, PRIV_PROC_SESSION) != 0)
295 		fatal("priv_delset: %s", strerror(errno));
296 
297 	if (getppriv(PRIV_PERMITTED, pset) != 0)
298 		fatal("getppriv: %s", strerror(errno));
299 
300 	priv_intersect(pset, npset);
301 
302 	if (setppriv(PRIV_SET, PRIV_PERMITTED, npset) != 0 ||
303 	    setppriv(PRIV_SET, PRIV_LIMIT, npset) != 0 ||
304 	    setppriv(PRIV_SET, PRIV_INHERITABLE, npset) != 0)
305 		fatal("setppriv: %s", strerror(errno));
306 
307 	priv_freeset(pset);
308 	priv_freeset(npset);
309 }
310 
311 void
312 solaris_drop_privs_root_pinfo_net(void)
313 {
314 	priv_set_t *pset = NULL;
315 
316 	/* Start with "basic" and drop everything we don't need. */
317 	if ((pset = solaris_basic_privset()) == NULL)
318 		fatal("solaris_basic_privset: %s", strerror(errno));
319 
320 	if (priv_delset(pset, PRIV_FILE_LINK_ANY) != 0 ||
321 #ifdef PRIV_NET_ACCESS
322 	    priv_delset(pset, PRIV_NET_ACCESS) != 0 ||
323 #endif
324 	    priv_delset(pset, PRIV_PROC_INFO) != 0 ||
325 	    priv_delset(pset, PRIV_PROC_SESSION) != 0)
326 		fatal("priv_delset: %s", strerror(errno));
327 
328 	if (setppriv(PRIV_SET, PRIV_PERMITTED, pset) != 0 ||
329 	    setppriv(PRIV_SET, PRIV_LIMIT, pset) != 0 ||
330 	    setppriv(PRIV_SET, PRIV_INHERITABLE, pset) != 0)
331 		fatal("setppriv: %s", strerror(errno));
332 
333 	priv_freeset(pset);
334 }
335 
336 void
337 solaris_drop_privs_root_pinfo_net_exec(void)
338 {
339 	priv_set_t *pset = NULL;
340 
341 
342 	/* Start with "basic" and drop everything we don't need. */
343 	if ((pset = solaris_basic_privset()) == NULL)
344 		fatal("solaris_basic_privset: %s", strerror(errno));
345 
346 	if (priv_delset(pset, PRIV_FILE_LINK_ANY) != 0 ||
347 #ifdef PRIV_NET_ACCESS
348 	    priv_delset(pset, PRIV_NET_ACCESS) != 0 ||
349 #endif
350 	    priv_delset(pset, PRIV_PROC_EXEC) != 0 ||
351 	    priv_delset(pset, PRIV_PROC_INFO) != 0 ||
352 	    priv_delset(pset, PRIV_PROC_SESSION) != 0)
353 		fatal("priv_delset: %s", strerror(errno));
354 
355 	if (setppriv(PRIV_SET, PRIV_PERMITTED, pset) != 0 ||
356 	    setppriv(PRIV_SET, PRIV_LIMIT, pset) != 0 ||
357 	    setppriv(PRIV_SET, PRIV_INHERITABLE, pset) != 0)
358 		fatal("setppriv: %s", strerror(errno));
359 
360 	priv_freeset(pset);
361 }
362 
363 #endif
364