xref: /freebsd/share/man/man4/mac.4 (revision 370e009188ba90c3290b1479aa06ec98b66e140a)
1.\" Copyright (c) 2003 Networks Associates Technology, Inc.
2.\" All rights reserved.
3.\"
4.\" This software was developed for the FreeBSD Project by Chris Costello
5.\" at Safeport Network Services and Network Associates Labs, the
6.\" Security Research Division of Network Associates, Inc. under
7.\" DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
8.\" DARPA CHATS research program.
9.\"
10.\" Redistribution and use in source and binary forms, with or without
11.\" modification, are permitted provided that the following conditions
12.\" are met:
13.\" 1. Redistributions of source code must retain the above copyright
14.\"    notice, this list of conditions and the following disclaimer.
15.\" 2. Redistributions in binary form must reproduce the above copyright
16.\"    notice, this list of conditions and the following disclaimer in the
17.\"    documentation and/or other materials provided with the distribution.
18.\"
19.\" THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
20.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
23.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29.\" SUCH DAMAGE.
30.\"
31.\" $FreeBSD$
32.\"
33.Dd June 29, 2022
34.Dt MAC 4
35.Os
36.Sh NAME
37.Nm mac
38.Nd Mandatory Access Control
39.Sh SYNOPSIS
40.Cd "options MAC"
41.Sh DESCRIPTION
42.Ss Introduction
43The Mandatory Access Control, or MAC, framework allows administrators to
44finely control system security by providing for a loadable security policy
45architecture.
46It is important to note that due to its nature, MAC security policies may
47only restrict access relative to one another and the base system policy;
48they cannot override traditional
49.Ux
50security provisions such as file permissions and superuser checks.
51.Pp
52Currently, the following MAC policy modules are shipped with
53.Fx :
54.Bl -column ".Xr mac_seeotheruids 4" "ddb(4) interface restrictions" ".Em Labeling" "boot only"
55.It Sy Name Ta Sy Description Ta Sy Labeling Ta Sy "Load time"
56.It Xr mac_biba 4 Ta "Biba integrity policy" Ta yes Ta boot only
57.It Xr mac_bsdextended 4 Ta "File system firewall" Ta no Ta any time
58.It Xr mac_ddb 4 Ta "ddb(4) interface restrictions" Ta no Ta any time
59.It Xr mac_ifoff 4 Ta "Interface silencing" Ta no Ta any time
60.It Xr mac_lomac 4 Ta "Low-Watermark MAC policy" Ta yes Ta boot only
61.It Xr mac_mls 4 Ta "Confidentiality policy" Ta yes Ta boot only
62.It Xr mac_none 4 Ta "Sample no-op policy" Ta no Ta any time
63.It Xr mac_partition 4 Ta "Process partition policy" Ta yes Ta any time
64.It Xr mac_portacl 4 Ta "Port bind(2) access control" Ta no Ta any time
65.It Xr mac_seeotheruids 4 Ta "See-other-UIDs policy" Ta no Ta any time
66.It Xr mac_test 4 Ta "MAC testing policy" Ta no Ta any time
67.El
68.Ss MAC Labels
69Each system subject (processes, sockets, etc.) and each system object
70(file system objects, sockets, etc.) can carry with it a MAC label.
71MAC labels contain data in an arbitrary format
72taken into consideration in making access control decisions
73for a given operation.
74Most MAC labels on system subjects and objects
75can be modified directly or indirectly by the system
76administrator.
77The format for a given policy's label may vary depending on the type
78of object or subject being labeled.
79More information on the format for MAC labels can be found in the
80.Xr maclabel 7
81man page.
82.Ss MAC Support for UFS2 File Systems
83By default, file system enforcement of labeled MAC policies relies on
84a single file system label
85(see
86.Sx "MAC Labels" )
87in order to make access control decisions for all the files in a particular
88file system.
89With some policies, this configuration may not allow administrators to take
90full advantage of features.
91In order to enable support for labeling files on an individual basis
92for a particular file system,
93the
94.Dq multilabel
95flag must be enabled on the file system.
96To set the
97.Dq multilabel
98flag, drop to single-user mode and unmount the file system,
99then execute the following command:
100.Pp
101.Dl "tunefs -l enable" Ar filesystem
102.Pp
103where
104.Ar filesystem
105is either the mount point
106(in
107.Xr fstab 5 )
108or the special file
109(in
110.Pa /dev )
111corresponding to the file system on which to enable multilabel support.
112.Ss Policy Enforcement
113Policy enforcement is divided into the following areas of the system:
114.Bl -ohang
115.It Sy "File System"
116File system mounts, modifying directories, modifying files, etc.
117.It Sy KLD
118Loading, unloading, and retrieving statistics on loaded kernel modules
119.It Sy Network
120Network interfaces,
121.Xr bpf 4 ,
122packet delivery and transmission,
123interface configuration
124.Xr ( ioctl 2 ,
125.Xr ifconfig 8 )
126.It Sy Pipes
127Creation of and operation on
128.Xr pipe 2
129objects
130.It Sy Processes
131Debugging
132(e.g.\&
133.Xr ktrace 2 ) ,
134process visibility
135.Pq Xr ps 1 ,
136process execution
137.Pq Xr execve 2 ,
138signalling
139.Pq Xr kill 2
140.It Sy Sockets
141Creation of and operation on
142.Xr socket 2
143objects
144.It Sy System
145Kernel environment
146.Pq Xr kenv 1 ,
147system accounting
148.Pq Xr acct 2 ,
149.Xr reboot 2 ,
150.Xr settimeofday 2 ,
151.Xr swapon 2 ,
152.Xr sysctl 3 ,
153.Xr nfsd 8 Ns
154-related operations
155.It Sy VM
156.Xr mmap 2 Ns
157-ed files
158.El
159.Ss Setting MAC Labels
160From the command line, each type of system object has its own means for setting
161and modifying its MAC policy label.
162.Bl -column "user (by login class)" "Xr setfmac 8 , Xr setfsmac 8" -offset indent
163.It Sy "Subject/Object" Ta Sy "Utility"
164.It "File system object" Ta Xr setfmac 8 , Xr setfsmac 8
165.It "Network interface" Ta Xr ifconfig 8
166.It "TTY (by login class)" Ta Xr login.conf 5
167.It "User (by login class)" Ta Xr login.conf 5
168.El
169.Pp
170Additionally, the
171.Xr su 1
172and
173.Xr setpmac 8
174utilities can be used to run a command with a different process label than
175the shell's current label.
176.Ss Programming With MAC
177MAC security enforcement itself is transparent to application
178programs, with the exception that some programs may need to be aware of
179additional
180.Xr errno 2
181returns from various system calls.
182.Pp
183The interface for retrieving, handling, and setting policy labels
184is documented in the
185.Xr mac 3
186man page.
187.\" *** XXX ***
188.\" Support for this feature is poor and should not be encouraged.
189.\"
190.\" .It Va security.mac.mmap_revocation
191.\" Revoke
192.\" .Xr mmap 2
193.\" access to files on subject relabel.
194.\" .It Va security.mac.mmap_revocation_via_cow
195.\" Revoke
196.\" .Xr mmap 2
197.\" access to files via copy-on-write semantics;
198.\" mapped regions will still appear writable, but will no longer
199.\" effect a change on the underlying vnode.
200.\" (Default: 0).
201.Sh SEE ALSO
202.Xr mac 3 ,
203.Xr mac_biba 4 ,
204.Xr mac_bsdextended 4 ,
205.Xr mac_ddb 4 ,
206.Xr mac_ifoff 4 ,
207.Xr mac_lomac 4 ,
208.Xr mac_mls 4 ,
209.Xr mac_none 4 ,
210.Xr mac_partition 4 ,
211.Xr mac_portacl 4 ,
212.Xr mac_seeotheruids 4 ,
213.Xr mac_test 4 ,
214.Xr login.conf 5 ,
215.Xr maclabel 7 ,
216.Xr getfmac 8 ,
217.Xr getpmac 8 ,
218.Xr setfmac 8 ,
219.Xr setpmac 8 ,
220.Xr mac 9
221.Rs
222.%B "The FreeBSD Handbook"
223.%T "Mandatory Access Control"
224.%U https://docs.FreeBSD.org/en/books/handbook/mac/
225.Re
226.Sh HISTORY
227The
228.Nm
229implementation first appeared in
230.Fx 5.0
231and was developed by the
232.Tn TrustedBSD
233Project.
234.Sh AUTHORS
235This software was contributed to the
236.Fx
237Project by Network Associates Labs,
238the Security Research Division of Network Associates
239Inc.
240under DARPA/SPAWAR contract N66001-01-C-8035
241.Pq Dq CBOSS ,
242as part of the DARPA CHATS research program.
243.Sh BUGS
244While the MAC Framework design is intended to support the containment of
245the root user, not all attack channels are currently protected by entry
246point checks.
247As such, MAC Framework policies should not be relied on, in isolation,
248to protect against a malicious privileged user.
249