xref: /freebsd/crypto/openssh/openbsd-compat/port-solaris.c (revision b077aed33b7b6aefca7b17ddb250cf521f938613)
1 /*
2  * Copyright (c) 2006 Chad Mynhier.
3  *
4  * Permission to use, copy, modify, and distribute this software for any
5  * purpose with or without fee is hereby granted, provided that the above
6  * copyright notice and this permission notice appear in all copies.
7  *
8  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15  */
16 
17 #include "config.h"
18 #include "includes.h"
19 
20 #include <sys/types.h>
21 #include <sys/stat.h>
22 
23 #include <errno.h>
24 #ifdef HAVE_FCNTL_H
25 # include <fcntl.h>
26 #endif
27 #include <stdarg.h>
28 #include <string.h>
29 #include <unistd.h>
30 
31 #include "log.h"
32 
33 #ifdef USE_SOLARIS_PROCESS_CONTRACTS
34 
35 #include <libcontract.h>
36 #include <sys/contract/process.h>
37 #include <sys/ctfs.h>
38 
39 #define CT_TEMPLATE	CTFS_ROOT "/process/template"
40 #define CT_LATEST	CTFS_ROOT "/process/latest"
41 
42 static int tmpl_fd = -1;
43 
44 /* Lookup the latest process contract */
45 static ctid_t
46 get_active_process_contract_id(void)
47 {
48 	int stat_fd;
49 	ctid_t ctid = -1;
50 	ct_stathdl_t stathdl;
51 
52 	if ((stat_fd = open64(CT_LATEST, O_RDONLY)) == -1) {
53 		error("%s: Error opening 'latest' process "
54 		    "contract: %s", __func__, strerror(errno));
55 		return -1;
56 	}
57 	if (ct_status_read(stat_fd, CTD_COMMON, &stathdl) != 0) {
58 		error("%s: Error reading process contract "
59 		    "status: %s", __func__, strerror(errno));
60 		goto out;
61 	}
62 	if ((ctid = ct_status_get_id(stathdl)) < 0) {
63 		error("%s: Error getting process contract id: %s",
64 		    __func__, strerror(errno));
65 		goto out;
66 	}
67 
68 	ct_status_free(stathdl);
69  out:
70 	close(stat_fd);
71 	return ctid;
72 }
73 
74 void
75 solaris_contract_pre_fork(void)
76 {
77 	if ((tmpl_fd = open64(CT_TEMPLATE, O_RDWR)) == -1) {
78 		error("%s: open %s: %s", __func__,
79 		    CT_TEMPLATE, strerror(errno));
80 		return;
81 	}
82 
83 	debug2("%s: setting up process contract template on fd %d",
84 	    __func__, tmpl_fd);
85 
86 	/* First we set the template parameters and event sets. */
87 	if (ct_pr_tmpl_set_param(tmpl_fd, CT_PR_PGRPONLY) != 0) {
88 		error("%s: Error setting process contract parameter set "
89 		    "(pgrponly): %s", __func__, strerror(errno));
90 		goto fail;
91 	}
92 	if (ct_pr_tmpl_set_fatal(tmpl_fd, CT_PR_EV_HWERR) != 0) {
93 		error("%s: Error setting process contract template "
94 		    "fatal events: %s", __func__, strerror(errno));
95 		goto fail;
96 	}
97 	if (ct_tmpl_set_critical(tmpl_fd, 0) != 0) {
98 		error("%s: Error setting process contract template "
99 		    "critical events: %s", __func__, strerror(errno));
100 		goto fail;
101 	}
102 	if (ct_tmpl_set_informative(tmpl_fd, CT_PR_EV_HWERR) != 0) {
103 		error("%s: Error setting process contract template "
104 		    "informative events: %s", __func__, strerror(errno));
105 		goto fail;
106 	}
107 
108 	/* Now make this the active template for this process. */
109 	if (ct_tmpl_activate(tmpl_fd) != 0) {
110 		error("%s: Error activating process contract "
111 		    "template: %s", __func__, strerror(errno));
112 		goto fail;
113 	}
114 	return;
115 
116  fail:
117 	if (tmpl_fd != -1) {
118 		close(tmpl_fd);
119 		tmpl_fd = -1;
120 	}
121 }
122 
123 void
124 solaris_contract_post_fork_child()
125 {
126 	debug2("%s: clearing process contract template on fd %d",
127 	    __func__, tmpl_fd);
128 
129 	/* Clear the active template. */
130 	if (ct_tmpl_clear(tmpl_fd) != 0)
131 		error("%s: Error clearing active process contract "
132 		    "template: %s", __func__, strerror(errno));
133 
134 	close(tmpl_fd);
135 	tmpl_fd = -1;
136 }
137 
138 void
139 solaris_contract_post_fork_parent(pid_t pid)
140 {
141 	ctid_t ctid;
142 	char ctl_path[256];
143 	int r, ctl_fd = -1, stat_fd = -1;
144 
145 	debug2("%s: clearing template (fd %d)", __func__, tmpl_fd);
146 
147 	if (tmpl_fd == -1)
148 		return;
149 
150 	/* First clear the active template. */
151 	if ((r = ct_tmpl_clear(tmpl_fd)) != 0)
152 		error("%s: Error clearing active process contract "
153 		    "template: %s", __func__, strerror(errno));
154 
155 	close(tmpl_fd);
156 	tmpl_fd = -1;
157 
158 	/*
159 	 * If either the fork didn't succeed (pid < 0), or clearing
160 	 * th active contract failed (r != 0), then we have nothing
161 	 * more do.
162 	 */
163 	if (r != 0 || pid <= 0)
164 		return;
165 
166 	/* Now lookup and abandon the contract we've created. */
167 	ctid = get_active_process_contract_id();
168 
169 	debug2("%s: abandoning contract id %ld", __func__, ctid);
170 
171 	snprintf(ctl_path, sizeof(ctl_path),
172 	    CTFS_ROOT "/process/%ld/ctl", ctid);
173 	if ((ctl_fd = open64(ctl_path, O_WRONLY)) < 0) {
174 		error("%s: Error opening process contract "
175 		    "ctl file: %s", __func__, strerror(errno));
176 		goto fail;
177 	}
178 	if (ct_ctl_abandon(ctl_fd) < 0) {
179 		error("%s: Error abandoning process contract: %s",
180 		    __func__, strerror(errno));
181 		goto fail;
182 	}
183 	close(ctl_fd);
184 	return;
185 
186  fail:
187 	if (tmpl_fd != -1) {
188 		close(tmpl_fd);
189 		tmpl_fd = -1;
190 	}
191 	if (stat_fd != -1)
192 		close(stat_fd);
193 	if (ctl_fd != -1)
194 		close(ctl_fd);
195 }
196 #endif
197 
198 #ifdef USE_SOLARIS_PROJECTS
199 #include <sys/task.h>
200 #include <project.h>
201 
202 /*
203  * Get/set solaris default project.
204  * If we fail, just run along gracefully.
205  */
206 void
207 solaris_set_default_project(struct passwd *pw)
208 {
209 	struct project  *defaultproject;
210 	struct project   tempproject;
211 	char buf[1024];
212 
213 	/* get default project, if we fail just return gracefully  */
214 	if ((defaultproject = getdefaultproj(pw->pw_name, &tempproject, &buf,
215 	    sizeof(buf))) != NULL) {
216 		/* set default project */
217 		if (setproject(defaultproject->pj_name, pw->pw_name,
218 		    TASK_NORMAL) != 0)
219 			debug("setproject(%s): %s", defaultproject->pj_name,
220 			    strerror(errno));
221 	} else {
222 		/* debug on getdefaultproj() error */
223 		debug("getdefaultproj(%s): %s", pw->pw_name, strerror(errno));
224 	}
225 }
226 #endif /* USE_SOLARIS_PROJECTS */
227 
228 #ifdef USE_SOLARIS_PRIVS
229 # ifdef HAVE_PRIV_H
230 #  include <priv.h>
231 # endif
232 
233 priv_set_t *
234 solaris_basic_privset(void)
235 {
236 	priv_set_t *pset;
237 
238 #ifdef HAVE_PRIV_BASICSET
239 	if ((pset = priv_allocset()) == NULL) {
240 		error("priv_allocset: %s", strerror(errno));
241 		return NULL;
242 	}
243 	priv_basicset(pset);
244 #else
245 	if ((pset = priv_str_to_set("basic", ",", NULL)) == NULL) {
246 		error("priv_str_to_set: %s", strerror(errno));
247 		return NULL;
248 	}
249 #endif
250 	return pset;
251 }
252 
253 void
254 solaris_drop_privs_pinfo_net_fork_exec(void)
255 {
256 	priv_set_t *pset = NULL, *npset = NULL;
257 
258 	/*
259 	 * Note: this variant avoids dropping DAC filesystem rights, in case
260 	 * the process calling it is running as root and should have the
261 	 * ability to read/write/chown any file on the system.
262 	 *
263 	 * We start with the basic set, then *add* the DAC rights to it while
264 	 * taking away other parts of BASIC we don't need. Then we intersect
265 	 * this with our existing PERMITTED set. In this way we keep any
266 	 * DAC rights we had before, while otherwise reducing ourselves to
267 	 * the minimum set of privileges we need to proceed.
268 	 *
269 	 * This also means we drop any other parts of "root" that we don't
270 	 * need (e.g. the ability to kill any process, create new device nodes
271 	 * etc etc).
272 	 */
273 
274 	if ((pset = priv_allocset()) == NULL)
275 		fatal("priv_allocset: %s", strerror(errno));
276 	if ((npset = solaris_basic_privset()) == NULL)
277 		fatal("solaris_basic_privset: %s", strerror(errno));
278 
279 	if (priv_addset(npset, PRIV_FILE_CHOWN) != 0 ||
280 	    priv_addset(npset, PRIV_FILE_DAC_READ) != 0 ||
281 	    priv_addset(npset, PRIV_FILE_DAC_SEARCH) != 0 ||
282 	    priv_addset(npset, PRIV_FILE_DAC_WRITE) != 0 ||
283 	    priv_addset(npset, PRIV_FILE_OWNER) != 0)
284 		fatal("priv_addset: %s", strerror(errno));
285 
286 	if (priv_delset(npset, PRIV_PROC_EXEC) != 0 ||
287 #ifdef PRIV_NET_ACCESS
288 	    priv_delset(npset, PRIV_NET_ACCESS) != 0 ||
289 #endif
290 	    priv_delset(npset, PRIV_PROC_FORK) != 0 ||
291 	    priv_delset(npset, PRIV_PROC_INFO) != 0 ||
292 	    priv_delset(npset, PRIV_PROC_SESSION) != 0)
293 		fatal("priv_delset: %s", strerror(errno));
294 
295 	if (getppriv(PRIV_PERMITTED, pset) != 0)
296 		fatal("getppriv: %s", strerror(errno));
297 
298 	priv_intersect(pset, npset);
299 
300 	if (setppriv(PRIV_SET, PRIV_PERMITTED, npset) != 0 ||
301 	    setppriv(PRIV_SET, PRIV_LIMIT, npset) != 0 ||
302 	    setppriv(PRIV_SET, PRIV_INHERITABLE, npset) != 0)
303 		fatal("setppriv: %s", strerror(errno));
304 
305 	priv_freeset(pset);
306 	priv_freeset(npset);
307 }
308 
309 void
310 solaris_drop_privs_root_pinfo_net(void)
311 {
312 	priv_set_t *pset = NULL;
313 
314 	/* Start with "basic" and drop everything we don't need. */
315 	if ((pset = solaris_basic_privset()) == NULL)
316 		fatal("solaris_basic_privset: %s", strerror(errno));
317 
318 	if (priv_delset(pset, PRIV_FILE_LINK_ANY) != 0 ||
319 #ifdef PRIV_NET_ACCESS
320 	    priv_delset(pset, PRIV_NET_ACCESS) != 0 ||
321 #endif
322 	    priv_delset(pset, PRIV_PROC_INFO) != 0 ||
323 	    priv_delset(pset, PRIV_PROC_SESSION) != 0)
324 		fatal("priv_delset: %s", strerror(errno));
325 
326 	if (setppriv(PRIV_SET, PRIV_PERMITTED, pset) != 0 ||
327 	    setppriv(PRIV_SET, PRIV_LIMIT, pset) != 0 ||
328 	    setppriv(PRIV_SET, PRIV_INHERITABLE, pset) != 0)
329 		fatal("setppriv: %s", strerror(errno));
330 
331 	priv_freeset(pset);
332 }
333 
334 void
335 solaris_drop_privs_root_pinfo_net_exec(void)
336 {
337 	priv_set_t *pset = NULL;
338 
339 
340 	/* Start with "basic" and drop everything we don't need. */
341 	if ((pset = solaris_basic_privset()) == NULL)
342 		fatal("solaris_basic_privset: %s", strerror(errno));
343 
344 	if (priv_delset(pset, PRIV_FILE_LINK_ANY) != 0 ||
345 #ifdef PRIV_NET_ACCESS
346 	    priv_delset(pset, PRIV_NET_ACCESS) != 0 ||
347 #endif
348 	    priv_delset(pset, PRIV_PROC_EXEC) != 0 ||
349 	    priv_delset(pset, PRIV_PROC_INFO) != 0)
350 		fatal("priv_delset: %s", strerror(errno));
351 
352 	if (setppriv(PRIV_SET, PRIV_PERMITTED, pset) != 0 ||
353 	    setppriv(PRIV_SET, PRIV_LIMIT, pset) != 0 ||
354 	    setppriv(PRIV_SET, PRIV_INHERITABLE, pset) != 0)
355 		fatal("setppriv: %s", strerror(errno));
356 
357 	priv_freeset(pset);
358 }
359 
360 #endif
361