mac: add new mac_ddb(4) policy

Generally, access to the kernel debugger is considered to be unsafe from
a security perspective since it presents an unrestricted interface to
inspect or modify the system state, including sensitive data such as
signing keys.

However, having some access to debugger functionality on production
systems may be useful in determining the cause of a panic or hang.
Therefore, it is desirable to have an optional policy which allows
limited use of ddb(4) while disabling the functionality which could
reveal system secrets.

This loadable MAC module allows for the use of some ddb(4) commands
while preventing the execution of others. The commands have been broadly
grouped into three categories:
 - Those which are 'safe' and will not emit sensitive data (e.g. trace).
   Generally, these commands are deterministic and don't accept
   arguments.
 - Those which are definitively unsafe (e.g. examine <addr>, search
   <addr> <value>)
 - Commands which may be safe to execute depending on the arguments
   provided (e.g. show thread <addr>).

Safe commands have been flagged as such with the DB_CMD_MEMSAFE flag.

Commands requiring extra validation can provide a function to do so.
For example, 'show thread <addr>' can be used as long as addr can be
checked against the system's list of process structures.

The policy also prevents debugger backends other than ddb(4) from
executing, for example gdb(4).

Reviewed by:	markj, pauamma_gundo.com (manpages)
Sponsored by:	Juniper Networks, Inc.
Sponsored by:	Klara, Inc.
Differential Revision:	https://reviews.freebsd.org/D35371
This commit is contained in:
Mitchell Horne 2022-07-18 17:24:06 -04:00 committed by Allan Jude
parent 2449b9e5fe
commit 287d467c5d
21 changed files with 404 additions and 2 deletions

View File

@ -150,6 +150,7 @@ and
manual pages.
.Sh SEE ALSO
.Xr ddb 4 ,
.Xr mac_ddb 4 ,
.Xr textdump 4 ,
.Xr sysctl 8
.Sh HISTORY

View File

@ -1602,6 +1602,7 @@ directory.
.Xr kgdb 1 ,
.Xr acpi 4 ,
.Xr CAM 4 ,
.Xr mac_ddb 4 ,
.Xr mac_test 4 ,
.Xr netgraph 4 ,
.Xr textdump 4 ,

View File

@ -30,7 +30,7 @@
.\"
.\" $FreeBSD$
.\"
.Dd May 20, 2021
.Dd June 29, 2022
.Dt MAC 4
.Os
.Sh NAME
@ -51,10 +51,11 @@ security provisions such as file permissions and superuser checks.
.Pp
Currently, the following MAC policy modules are shipped with
.Fx :
.Bl -column ".Xr mac_seeotheruids 4" "low-watermark mac policy" ".Em Labeling" "boot only"
.Bl -column ".Xr mac_seeotheruids 4" "ddb(4) interface restrictions" ".Em Labeling" "boot only"
.It Sy Name Ta Sy Description Ta Sy Labeling Ta Sy "Load time"
.It Xr mac_biba 4 Ta "Biba integrity policy" Ta yes Ta boot only
.It Xr mac_bsdextended 4 Ta "File system firewall" Ta no Ta any time
.It Xr mac_ddb 4 Ta "ddb(4) interface restrictions" Ta no Ta any time
.It Xr mac_ifoff 4 Ta "Interface silencing" Ta no Ta any time
.It Xr mac_lomac 4 Ta "Low-Watermark MAC policy" Ta yes Ta boot only
.It Xr mac_mls 4 Ta "Confidentiality policy" Ta yes Ta boot only
@ -201,6 +202,7 @@ man page.
.Xr mac 3 ,
.Xr mac_biba 4 ,
.Xr mac_bsdextended 4 ,
.Xr mac_ddb 4 ,
.Xr mac_ifoff 4 ,
.Xr mac_lomac 4 ,
.Xr mac_mls 4 ,

View File

@ -117,6 +117,7 @@ Currently does nothing interesting.
.Xr syslog 3 ,
.Xr mac 4 ,
.Xr mac_biba 4 ,
.Xr mac_ddb 4 ,
.Xr mac_ifoff 4 ,
.Xr mac_lomac 4 ,
.Xr mac_mls 4 ,

108
share/man/man4/mac_ddb.4 Normal file
View File

@ -0,0 +1,108 @@
.\" Copyright (c) 2022 Klara Systems
.\"
.\" This software was developed by Mitchell Horne <mhorne@FreeBSD.org>
.\" under sponsorship from Juniper Networks and Klara Systems.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.Dd June 29, 2022
.Dt MAC_DDB 4
.Os
.Sh NAME
.Nm mac_ddb
.Nd "Restricted kernel debugger interface policy"
.Sh SYNOPSIS
To compile the ddb policy
into your kernel, place the following lines in your kernel
configuration file:
.Bd -ragged -offset indent
.Cd "options MAC"
.Cd "options MAC_DDB"
.Ed
.Pp
Alternately, to load the ddb module at boot time, place the following line
in your kernel configuration file:
.Bd -ragged -offset indent
.Cd "options MAC"
.Ed
.Pp
and in
.Xr loader.conf 5 :
.Bd -literal -offset indent
mac_ddb_load="YES"
.Ed
.Sh DESCRIPTION
The
.Nm
policy module implements a MAC policy which restricts the set of commands that
can be used at the
.Xr ddb 4
command prompt.
The subset of permitted commands is limited to those which do not read or write
to arbitrary memory locations.
This is done to deter the possible extraction of system secrets while still
allowing enough debugger functionality to diagnose a kernel panic.
For example, the
.Ic trace
or
.Ic show registers
commands are allowed by this policy, but
.Ic show Cm buffer Ar addr
is not.
.Pp
All debugger commands that are declared with the
.Va DB_CMD_MEMSAFE
flag are allowed by
.Nm .
The policy provides validation functions to conditionally allow some additional
commands, based on the user provided arguments.
.Pp
When loaded, the
.Nm
policy also ensures that only the
.Xr ddb 4
debugger backend may be executed;
.Xr gdb 4
may not.
.Ss Label Format
No labels are defined for
.Nm .
.Sh SEE ALSO
.Xr ddb 4 ,
.Xr mac 4 ,
.Xr mac_biba 4 ,
.Xr mac_bsdextended 4 ,
.Xr mac_ifoff 4 ,
.Xr mac_lomac 4 ,
.Xr mac_mls 4 ,
.Xr mac_none 4 ,
.Xr mac_partition 4 ,
.Xr mac_portacl 4 ,
.Xr mac_seeotheruids 4 ,
.Xr mac_test 4 ,
.Xr mac 9
.Sh BUGS
While the MAC Framework design is intended to support the containment of
the root user, not all attack channels are currently protected by entry
point checks.
As such, MAC Framework policies should not be relied on, in isolation,
to protect against a malicious privileged user.

View File

@ -194,6 +194,7 @@ man pages.
.Xr mac 4 ,
.Xr mac_biba 4 ,
.Xr mac_bsdextended 4 ,
.Xr mac_ddb 4 ,
.Xr mac_ifoff 4 ,
.Xr mac_mls 4 ,
.Xr mac_none 4 ,

View File

@ -210,6 +210,7 @@ allow the superuser to bypass MLS protections.
.Xr mac 4 ,
.Xr mac_biba 4 ,
.Xr mac_bsdextended 4 ,
.Xr mac_ddb 4 ,
.Xr mac_ifoff 4 ,
.Xr mac_lomac 4 ,
.Xr mac_none 4 ,

View File

@ -71,6 +71,7 @@ No labels are defined for
.Xr mac 4 ,
.Xr mac_biba 4 ,
.Xr mac_bsdextended 4 ,
.Xr mac_ddb 4 ,
.Xr mac_ifoff 4 ,
.Xr mac_lomac 4 ,
.Xr mac_mls 4 ,

View File

@ -91,6 +91,7 @@ partition/none
.Xr mac 4 ,
.Xr mac_biba 4 ,
.Xr mac_bsdextended 4 ,
.Xr mac_ddb 4 ,
.Xr mac_ifoff 4 ,
.Xr mac_lomac 4 ,
.Xr mac_mls 4 ,

View File

@ -194,6 +194,7 @@ This tunable will exempt port 0 allocation from rule checking.
.Xr ip 4 ,
.Xr mac_biba 4 ,
.Xr mac_bsdextended 4 ,
.Xr mac_ddb 4 ,
.Xr mac_ifoff 4 ,
.Xr mac_mls 4 ,
.Xr mac_none 4 ,

View File

@ -90,6 +90,7 @@ No labels are defined for
.Xr mac 4 ,
.Xr mac_biba 4 ,
.Xr mac_bsdextended 4 ,
.Xr mac_ddb 4 ,
.Xr mac_ifoff 4 ,
.Xr mac_lomac 4 ,
.Xr mac_mls 4 ,

View File

@ -74,6 +74,7 @@ No labels are defined for
.Xr mac 4 ,
.Xr mac_biba 4 ,
.Xr mac_bsdextended 4 ,
.Xr mac_ddb 4 ,
.Xr mac_ifoff 4 ,
.Xr mac_lomac 4 ,
.Xr mac_mls 4 ,

View File

@ -76,6 +76,7 @@ No labels are defined for
.Xr mac 4 ,
.Xr mac_biba 4 ,
.Xr mac_bsdextended 4 ,
.Xr mac_ddb 4 ,
.Xr mac_ifoff 4 ,
.Xr mac_lomac 4 ,
.Xr mac_mls 4 ,

View File

@ -152,6 +152,7 @@ for information on the MAC Framework APIs.
.Xr posix1e 3 ,
.Xr mac_biba 4 ,
.Xr mac_bsdextended 4 ,
.Xr mac_ddb 4 ,
.Xr mac_ifoff 4 ,
.Xr mac_lomac 4 ,
.Xr mac_mls 4 ,

View File

@ -1235,6 +1235,7 @@ options AUDIT
options MAC
options MAC_BIBA
options MAC_BSDEXTENDED
options MAC_DDB
options MAC_IFOFF
options MAC_LOMAC
options MAC_MLS

View File

@ -5137,6 +5137,7 @@ security/mac/mac_sysv_sem.c optional mac
security/mac/mac_sysv_shm.c optional mac
security/mac/mac_vfs.c optional mac
security/mac_biba/mac_biba.c optional mac_biba
security/mac_ddb/mac_ddb.c optional mac_ddb
security/mac_bsdextended/mac_bsdextended.c optional mac_bsdextended
security/mac_bsdextended/ugidfw_system.c optional mac_bsdextended
security/mac_bsdextended/ugidfw_vnode.c optional mac_bsdextended

View File

@ -156,6 +156,7 @@ LIBICONV
MAC opt_global.h
MAC_BIBA opt_dontuse.h
MAC_BSDEXTENDED opt_dontuse.h
MAC_DDB opt_dontuse.h
MAC_IFOFF opt_dontuse.h
MAC_LOMAC opt_dontuse.h
MAC_MLS opt_dontuse.h

View File

@ -99,6 +99,7 @@ LIST_HEAD(db_command_table, db_command);
extern struct db_command_table db_cmd_table;
extern struct db_command_table db_show_table;
extern struct db_command_table db_show_all_table;
extern struct db_command_table db_show_active_table;
/*
* Type signature for a function implementing a ddb command.

View File

@ -219,6 +219,7 @@ SUBDIR= \
lpt \
${_mac_biba} \
${_mac_bsdextended} \
${_mac_ddb} \
${_mac_ifoff} \
${_mac_lomac} \
${_mac_mls} \
@ -546,6 +547,9 @@ _vmware= vmware
.if ${KERN_OPTS:MMAC} || defined(ALL_MODULES)
_mac_biba= mac_biba
_mac_bsdextended= mac_bsdextended
.if ${KERN_OPTS:MDDB} || defined(ALL_MODULES)
_mac_ddb= mac_ddb
.endif
_mac_ifoff= mac_ifoff
_mac_lomac= mac_lomac
_mac_mls= mac_mls

View File

@ -0,0 +1,6 @@
.PATH: ${SRCTOP}/sys/security/mac_ddb
KMOD= mac_ddb
SRCS= mac_ddb.c
.include <bsd.kmod.mk>

View File

@ -0,0 +1,266 @@
/*-
* SPDX-License-Identifier: BSD-2-Clause
*
* Copyright (c) 2021-2022 Klara Systems
*
* This software was developed by Mitchell Horne <mhorne@FreeBSD.org>
* under sponsorship from Juniper Networks and Klara Systems.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <sys/param.h>
#include <sys/kdb.h>
#include <sys/module.h>
#include <sys/proc.h>
#include <sys/sysctl.h>
#include <ddb/ddb.h>
#include <ddb/db_command.h>
#include <security/mac/mac_policy.h>
/*
* This module provides a limited interface to the ddb(4) kernel debugger. The
* intent is to allow execution of useful debugging commands while disallowing
* the execution of commands which may be used to inspect/modify arbitrary
* system memory.
*
* Commands which are deterministic in their output or effect and that have
* been flagged with DB_CMD_MEMSAFE in their definition will be allowed.
*
* Other commands are valid within this context so long as there is some
* constraint placed on their input arguments. This applies to most 'show'
* commands which accept an arbitrary address. If the provided address can be
* validated as a real instance of the object (e.g. the 'show proc' address
* points to a real struct proc in the process list), then the command may be
* executed. This module defines several validation functions which are used to
* conditionally allow or block the execution of some commands. For these
* commands we define and apply the DB_CMD_VALIDATE flag.
*
* Any other commands not flagged with DM_CMD_MEMSAFE or DB_CMD_VALIDATE are
* considered unsafe for execution.
*/
#define DB_CMD_VALIDATE DB_MAC1
typedef int db_validation_fn_t(db_expr_t addr, bool have_addr, db_expr_t count,
char *modif);
static db_validation_fn_t db_thread_valid;
struct cmd_list_item {
const char *name;
db_validation_fn_t *validate_fn;
};
/* List of top-level ddb(4) commands which are allowed by this policy. */
static const struct cmd_list_item command_list[] = {
{ "thread", db_thread_valid },
};
/* List of ddb(4) 'show' commands which are allowed by this policy. */
static const struct cmd_list_item show_command_list[] = {
{ "thread", db_thread_valid },
};
static int
db_thread_valid(db_expr_t addr, bool have_addr, db_expr_t count, char *modif)
{
struct thread *thr;
lwpid_t tid;
/* Default will show the current proc. */
if (!have_addr)
return (0);
/* Validate the provided addr OR tid against the thread list. */
tid = db_hex2dec(addr);
for (thr = kdb_thr_first(); thr != NULL; thr = kdb_thr_next(thr)) {
if ((void *)thr == (void *)addr || tid == thr->td_tid)
return (0);
}
return (EACCES);
}
static int
command_match(struct db_command *cmd, struct cmd_list_item item)
{
db_validation_fn_t *vfn;
int n;
n = strcmp(cmd->name, item.name);
if (n != 0)
return (n);
/* Got an exact match. Update the command struct */
vfn = item.validate_fn;
if (vfn != NULL) {
cmd->flag |= DB_CMD_VALIDATE;
cmd->mac_priv = vfn;
}
return (0);
}
static void
mac_ddb_init(struct mac_policy_conf *conf)
{
struct db_command *cmd, *prev;
int i, n;
/* The command lists are sorted lexographically, as are our arrays. */
/* Register basic commands. */
for (i = 0, cmd = prev = NULL; i < nitems(command_list); i++) {
LIST_FOREACH_FROM(cmd, &db_cmd_table, next) {
n = command_match(cmd, command_list[i]);
if (n == 0) {
/* Got an exact match. */
prev = cmd;
break;
} else if (n > 0) {
/* Desired command is not registered. */
break;
}
}
/* Next search begins at the previous match. */
cmd = prev;
}
/* Register 'show' commands which require validation. */
for (i = 0, cmd = prev = NULL; i < nitems(show_command_list); i++) {
LIST_FOREACH_FROM(cmd, &db_show_table, next) {
n = command_match(cmd, show_command_list[i]);
if (n == 0) {
/* Got an exact match. */
prev = cmd;
break;
} else if (n > 0) {
/* Desired command is not registered. */
break;
}
}
/* Next search begins at the previous match. */
cmd = prev;
}
#ifdef INVARIANTS
/* Verify the lists are sorted correctly. */
const char *a, *b;
for (i = 0; i < nitems(command_list) - 1; i++) {
a = command_list[i].name;
b = command_list[i + 1].name;
if (strcmp(a, b) > 0)
panic("%s: command_list[] not alphabetical: %s,%s",
__func__, a, b);
}
for (i = 0; i < nitems(show_command_list) - 1; i++) {
a = show_command_list[i].name;
b = show_command_list[i + 1].name;
if (strcmp(a, b) > 0)
panic("%s: show_command_list[] not alphabetical: %s,%s",
__func__, a, b);
}
#endif
}
static int
mac_ddb_command_register(struct db_command_table *table,
struct db_command *cmd)
{
int i, n;
if ((cmd->flag & DB_CMD_MEMSAFE) != 0)
return (0);
/* For other commands, search the allow-lists. */
if (table == &db_show_table) {
for (i = 0; i < nitems(show_command_list); i++) {
n = command_match(cmd, show_command_list[i]);
if (n == 0)
/* Got an exact match. */
return (0);
else if (n > 0)
/* Command is not in the policy list. */
break;
}
} else if (table == &db_cmd_table) {
for (i = 0; i < nitems(command_list); i++) {
n = command_match(cmd, command_list[i]);
if (n == 0)
/* Got an exact match. */
return (0);
else if (n > 0)
/* Command is not in the policy list. */
break;
}
}
/* The command will not be registered. */
return (EACCES);
}
static int
mac_ddb_command_exec(struct db_command *cmd, db_expr_t addr,
bool have_addr, db_expr_t count, char *modif)
{
db_validation_fn_t *vfn = cmd->mac_priv;
/* Validate the command and args based on policy. */
if ((cmd->flag & DB_CMD_VALIDATE) != 0) {
MPASS(vfn != NULL);
if (vfn(addr, have_addr, count, modif) == 0)
return (0);
} else if ((cmd->flag & DB_CMD_MEMSAFE) != 0)
return (0);
return (EACCES);
}
static int
mac_ddb_check_backend(struct kdb_dbbe *be)
{
/* Only allow DDB backend to execute. */
if (strcmp(be->dbbe_name, "ddb") == 0)
return (0);
return (EACCES);
}
/*
* Register functions with MAC Framework policy entry points.
*/
static struct mac_policy_ops mac_ddb_ops =
{
.mpo_init = mac_ddb_init,
.mpo_ddb_command_register = mac_ddb_command_register,
.mpo_ddb_command_exec = mac_ddb_command_exec,
.mpo_kdb_check_backend = mac_ddb_check_backend,
};
MAC_POLICY_SET(&mac_ddb_ops, mac_ddb, "MAC/DDB", 0, NULL);