Summary of login.conf support changes:
o Incorporated BSDI code and enhancements, better logging for error
checking (which has been shown to be a problem, and is therefore
justified, imho); also some minor things we were missing, including
better quad_t math, which checks for under/overflows.
o setusercontext() now allows user resource limit overrides, but
does this AFTER dropping root privs, to restrict the user to
droping hard limits and set soft limits within the kernel's
allowed user limits.
o umask() only set once, and only if requested.
o add _secure_path(), and use in login.conf to guard against
symlinks etc. and non-root owned or non-user owned files being
used. Derived from BSDI contributed code.
o revamped authentication code to BSDI's latest api, which
includes deleting authenticate() and adding auth_check()
and a few other functions. This is still marked as depecated
in BSDI, but is included for completeness. No other source
in the tree uses this anyway, so it is now bracketed with
#ifdef LOGIN_CAP_AUTH which is by default not defined. Only
auth_checknologin() and auth_cat() are actually used in
module login_auth.c.
o AUTH_NONE definition removed (collided with other includes
in the tree). [bde]
o BSDI's login_getclass() now accepts a char *classname
parameter rather than struct passwd *pwd. We now do likewise,
but added login_getpwclass() for (sort of) backwards
compatiblity, namely because we handle root as a special
case for the default class. This will require quite a few
changes elsewhere in the source tree.
o We no longer pretend to support rlim_t as a long type.
o Revised code formatting to be more bsd-ish style.
1997-05-10 18:55:38 +00:00
|
|
|
.\" Copyright (c) 1997 David Nugent <davidn@blaze.net.au>
|
|
|
|
.\" All rights reserved.
|
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, is permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice immediately at the beginning of the file, without modification,
|
|
|
|
.\" this list of conditions, and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\" 3. This work was done expressly for inclusion into FreeBSD. Other use
|
|
|
|
.\" is permitted provided this notation is included.
|
|
|
|
.\" 4. Absolutely no warranty of function or purpose is made by the author
|
|
|
|
.\" David Nugent.
|
|
|
|
.\" 5. Modifications may be freely made to this file providing the above
|
|
|
|
.\" conditions are met.
|
|
|
|
.\"
|
1997-05-15 06:06:32 +00:00
|
|
|
.\" $Id: _secure_path.3,v 1.1 1997/05/10 18:55:37 davidn Exp $
|
Summary of login.conf support changes:
o Incorporated BSDI code and enhancements, better logging for error
checking (which has been shown to be a problem, and is therefore
justified, imho); also some minor things we were missing, including
better quad_t math, which checks for under/overflows.
o setusercontext() now allows user resource limit overrides, but
does this AFTER dropping root privs, to restrict the user to
droping hard limits and set soft limits within the kernel's
allowed user limits.
o umask() only set once, and only if requested.
o add _secure_path(), and use in login.conf to guard against
symlinks etc. and non-root owned or non-user owned files being
used. Derived from BSDI contributed code.
o revamped authentication code to BSDI's latest api, which
includes deleting authenticate() and adding auth_check()
and a few other functions. This is still marked as depecated
in BSDI, but is included for completeness. No other source
in the tree uses this anyway, so it is now bracketed with
#ifdef LOGIN_CAP_AUTH which is by default not defined. Only
auth_checknologin() and auth_cat() are actually used in
module login_auth.c.
o AUTH_NONE definition removed (collided with other includes
in the tree). [bde]
o BSDI's login_getclass() now accepts a char *classname
parameter rather than struct passwd *pwd. We now do likewise,
but added login_getpwclass() for (sort of) backwards
compatiblity, namely because we handle root as a special
case for the default class. This will require quite a few
changes elsewhere in the source tree.
o We no longer pretend to support rlim_t as a long type.
o Revised code formatting to be more bsd-ish style.
1997-05-10 18:55:38 +00:00
|
|
|
.\"
|
|
|
|
.Dd May 2, 1997
|
|
|
|
.Os FreeBSD
|
|
|
|
.Dt _SECURE_PATH 3
|
|
|
|
.Sh NAME
|
|
|
|
.Nm _secure_path
|
|
|
|
.Nd determine if a file appears to be secure
|
|
|
|
.Sh SYNOPSIS
|
|
|
|
.Fd #include <sys/types.h>
|
|
|
|
.Fd #include <libutil.h>
|
|
|
|
.Ft int
|
|
|
|
.Fn _secure_path "const char *path" "uid_t uid" "gid_t gid"
|
|
|
|
.Pp
|
|
|
|
.Sh DESCRIPTION
|
|
|
|
This function does some basic security checking on a given path.
|
|
|
|
It is intended to be used by processes running with root privileges
|
|
|
|
in order to decide whether or not to trust the contents of a given
|
|
|
|
file.
|
|
|
|
It uses a method often used to detect system compromise.
|
|
|
|
.Pp
|
|
|
|
A file is considered 'secure' if it meets the following conditions:
|
|
|
|
.Bl -enum
|
|
|
|
.It
|
|
|
|
The file exists, and is a regular file (not a symlink, device
|
|
|
|
special or named pipe, etc.),
|
|
|
|
.It
|
|
|
|
Is not world writable.
|
|
|
|
.It
|
1997-05-15 06:06:32 +00:00
|
|
|
Is owned by the given uid or uid 0, if uid is not -1,
|
Summary of login.conf support changes:
o Incorporated BSDI code and enhancements, better logging for error
checking (which has been shown to be a problem, and is therefore
justified, imho); also some minor things we were missing, including
better quad_t math, which checks for under/overflows.
o setusercontext() now allows user resource limit overrides, but
does this AFTER dropping root privs, to restrict the user to
droping hard limits and set soft limits within the kernel's
allowed user limits.
o umask() only set once, and only if requested.
o add _secure_path(), and use in login.conf to guard against
symlinks etc. and non-root owned or non-user owned files being
used. Derived from BSDI contributed code.
o revamped authentication code to BSDI's latest api, which
includes deleting authenticate() and adding auth_check()
and a few other functions. This is still marked as depecated
in BSDI, but is included for completeness. No other source
in the tree uses this anyway, so it is now bracketed with
#ifdef LOGIN_CAP_AUTH which is by default not defined. Only
auth_checknologin() and auth_cat() are actually used in
module login_auth.c.
o AUTH_NONE definition removed (collided with other includes
in the tree). [bde]
o BSDI's login_getclass() now accepts a char *classname
parameter rather than struct passwd *pwd. We now do likewise,
but added login_getpwclass() for (sort of) backwards
compatiblity, namely because we handle root as a special
case for the default class. This will require quite a few
changes elsewhere in the source tree.
o We no longer pretend to support rlim_t as a long type.
o Revised code formatting to be more bsd-ish style.
1997-05-10 18:55:38 +00:00
|
|
|
.It
|
|
|
|
Is not group wriable or it has group ownership by the given
|
|
|
|
gid, if gid is not -1.
|
|
|
|
.El
|
|
|
|
.Sh RETURN VALUES
|
|
|
|
This function returns zero if the file exists and may be
|
|
|
|
considered secure, -2 if the file does not exist, and
|
|
|
|
-1 otherwise to indicate a security failure.
|
|
|
|
.Xr syslog 3 ,
|
|
|
|
is used to log any failure of this function, including the
|
|
|
|
reason, at LOG_ERR priority.
|
|
|
|
.Sh BUGS
|
|
|
|
The checks carried out are rudamentary and no attempt is made
|
|
|
|
to eliminate race conditions between use of this function and
|
|
|
|
access to the file referenced.
|
|
|
|
.Sh SEE ALSO
|
|
|
|
.Xr lstat 3 ,
|
|
|
|
.Xr syslog 3 .
|
|
|
|
.Sh HISTORY
|
|
|
|
Code from which this function was derived was contributed to the
|
|
|
|
FreeBSD project by Berkeley Software Design, Inc.
|