123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185 |
- /* vim: set expandtab ts=4 sw=4: */
- /*
- * You may redistribute this program and/or modify it under the terms of
- * the GNU General Public License as published by the Free Software Foundation,
- * either version 3 of the License, or (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <https://www.gnu.org/licenses/>.
- */
- #define _GNU_SOURCE // chroot(), MAP_ANONYMOUS
- #include "benc/Dict.h"
- #include "benc/String.h"
- #include "exception/Except.h"
- #include "util/log/Log.h"
- #include "util/Security.h"
- #include "util/Seccomp.h"
- #include "memory/Allocator.h"
- #include "util/Bits.h"
- #include "util/Setuid.h"
- #include "util/events/EventBase.h"
- #include "util/events/Timeout.h"
- #include <sys/resource.h>
- #include <sys/types.h>
- #include <pwd.h>
- #include <unistd.h>
- #include <errno.h>
- #include <stdlib.h>
- #include <string.h>
- #include <sys/mman.h>
- #include <stdio.h>
- Dict* Security_getUser(char* userName, struct Allocator* retAlloc)
- {
- struct passwd* pw;
- if (userName) {
- pw = getpwnam(userName);
- } else {
- pw = getpwuid(getuid());
- }
- Dict* ret = Dict_new(retAlloc);
- if (!pw) {
- Dict_putString(ret, String_new("error", retAlloc),
- String_printf(retAlloc, "Could not find user [%s]", strerror(errno)),
- retAlloc);
- return ret;
- }
- Dict_putString(ret, String_new("error", retAlloc), String_new("none", retAlloc), retAlloc);
- Dict_putString(ret, String_new("name", retAlloc), String_new(pw->pw_name, retAlloc), retAlloc);
- Dict_putInt(ret, String_new("uid", retAlloc), pw->pw_uid, retAlloc);
- Dict_putInt(ret, String_new("gid", retAlloc), pw->pw_gid, retAlloc);
- return ret;
- }
- void Security_setUser(int uid,
- int gid,
- bool keepNetAdmin,
- struct Log* logger,
- struct Except* eh,
- struct Allocator* alloc)
- {
- int gidErrno = 0;
- int uidErrno = 0;
- if (keepNetAdmin) {
- Setuid_preSetuid(alloc, eh);
- }
- if (gid && setgid(gid)) {
- gidErrno = errno;
- }
- if (setuid(uid)) {
- // errno is global and could get overwritten by Setuid_postSetuid()
- uidErrno = errno;
- }
- if (keepNetAdmin) {
- Setuid_postSetuid(alloc, eh);
- }
- if (uidErrno > 0) {
- Except_throw(eh, "Failed to set UID [%s]", strerror(uidErrno));
- }
- if (uid != (int) getuid()) {
- Except_throw(eh, "Failed to set UID but seemed to succeed");
- }
- if (gidErrno > 0) {
- Except_throw(eh, "Failed to set GID [%s]", strerror(gidErrno));
- }
- if (gid != (int) getgid()) {
- Except_throw(eh, "Failed to set GID but seemed to succeed");
- }
- }
- static int canOpenFiles()
- {
- int file = dup(0);
- close(file);
- return file >= 0;
- }
- void Security_nofiles(struct Except* eh)
- {
- #if !defined(RLIMIT_NOFILE) && defined(RLIMIT_OFILE)
- #define RLIMIT_NOFILE RLIMIT_OFILE
- #endif
- if (!canOpenFiles()) {
- Except_throw(eh, "Unable to dupe stdin");
- }
- if (setrlimit(RLIMIT_NOFILE, &(struct rlimit){ 0, 0 })) {
- Except_throw(eh, "Failed to set open file limit to 0 [%s]", strerror(errno));
- }
- if (canOpenFiles()) {
- Except_throw(eh, "Still able to dupe stdin after setting number of files to 0!");
- }
- }
- void Security_noforks(struct Except* eh)
- {
- if (setrlimit(RLIMIT_NPROC, &(struct rlimit){ 0, 0 })) {
- Except_throw(eh, "Failed to set fork limit to 0 [%s]", strerror(errno));
- }
- }
- void Security_chroot(char* root, struct Except* eh)
- {
- if (chdir(root)) {
- Except_throw(eh, "chdir(%s) -> [%s]", root, strerror(errno));
- }
- if (chroot(root)) {
- Except_throw(eh, "chroot(%s) -> [%s]", root, strerror(errno));
- }
- }
- void Security_seccomp(struct Allocator* tempAlloc, struct Log* logger, struct Except* eh)
- {
- Seccomp_dropPermissions(tempAlloc, logger, eh);
- }
- struct Security_pvt
- {
- struct Security pub;
- struct Allocator* setupAlloc;
- struct Log* log;
- Identity
- };
- void Security_setupComplete(struct Security* security)
- {
- struct Security_pvt* sec = Identity_check((struct Security_pvt*) security);
- sec->pub.setupComplete = 1;
- Allocator_free(sec->setupAlloc);
- }
- static void fail(void* vSec)
- {
- struct Security_pvt* sec = Identity_check((struct Security_pvt*) vSec);
- Log_critical(sec->log, "Security_setupComplete() not called in time, exiting");
- exit(232);
- }
- struct Security* Security_new(struct Allocator* alloc, struct Log* log, struct EventBase* base)
- {
- struct Security_pvt* sec = Allocator_calloc(alloc, sizeof(struct Security_pvt), 1);
- Identity_set(sec);
- sec->setupAlloc = Allocator_child(alloc);
- Timeout_setInterval(fail, sec, 20000, base, sec->setupAlloc);
- sec->log = log;
- return &sec->pub;
- }
- struct Security_Permissions* Security_checkPermissions(struct Allocator* alloc, struct Except* eh)
- {
- struct Security_Permissions* out =
- Allocator_calloc(alloc, sizeof(struct Security_Permissions), 1);
- out->noOpenFiles = !canOpenFiles();
- out->seccompExists = Seccomp_exists();
- out->seccompEnforcing = Seccomp_isWorking();
- out->uid = getuid();
- return out;
- }
|