2010-02-18 23:16:19 +00:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 2010 The FreeBSD Foundation
|
2011-03-22 21:19:51 +00:00
|
|
|
* Copyright (c) 2011 Pawel Jakub Dawidek <pawel@dawidek.net>
|
2010-02-18 23:16:19 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* This software was developed by Pawel Jakub Dawidek under sponsorship from
|
|
|
|
* the FreeBSD Foundation.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
2011-06-27 09:14:25 +00:00
|
|
|
#ifdef HAVE_CAPSICUM
|
2011-03-21 21:31:50 +00:00
|
|
|
#include <sys/capability.h>
|
2011-06-27 09:14:25 +00:00
|
|
|
#endif
|
2011-05-14 17:02:03 +00:00
|
|
|
#include <sys/param.h>
|
2010-02-18 23:16:19 +00:00
|
|
|
#include <sys/disk.h>
|
|
|
|
#include <sys/ioctl.h>
|
2011-05-14 17:02:03 +00:00
|
|
|
#include <sys/jail.h>
|
2010-02-18 23:16:19 +00:00
|
|
|
#include <sys/stat.h>
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
2011-01-28 22:33:47 +00:00
|
|
|
#include <pwd.h>
|
2011-03-21 08:36:50 +00:00
|
|
|
#include <stdarg.h>
|
2011-03-21 21:31:50 +00:00
|
|
|
#include <stdbool.h>
|
2011-03-21 08:36:50 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
2011-01-28 22:33:47 +00:00
|
|
|
#include <unistd.h>
|
2010-02-18 23:16:19 +00:00
|
|
|
|
|
|
|
#include <pjdlog.h>
|
|
|
|
|
|
|
|
#include "hast.h"
|
|
|
|
#include "subr.h"
|
|
|
|
|
2011-03-21 08:36:50 +00:00
|
|
|
int
|
|
|
|
vsnprlcat(char *str, size_t size, const char *fmt, va_list ap)
|
|
|
|
{
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
len = strlen(str);
|
|
|
|
return (vsnprintf(str + len, size - len, fmt, ap));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
snprlcat(char *str, size_t size, const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
int result;
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
result = vsnprlcat(str, size, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2010-02-18 23:16:19 +00:00
|
|
|
int
|
|
|
|
provinfo(struct hast_resource *res, bool dowrite)
|
|
|
|
{
|
|
|
|
struct stat sb;
|
|
|
|
|
2011-01-31 18:32:17 +00:00
|
|
|
PJDLOG_ASSERT(res->hr_localpath != NULL &&
|
|
|
|
res->hr_localpath[0] != '\0');
|
2010-02-18 23:16:19 +00:00
|
|
|
|
|
|
|
if (res->hr_localfd == -1) {
|
|
|
|
res->hr_localfd = open(res->hr_localpath,
|
|
|
|
dowrite ? O_RDWR : O_RDONLY);
|
|
|
|
if (res->hr_localfd < 0) {
|
2011-09-27 07:52:39 +00:00
|
|
|
pjdlog_errno(LOG_ERR, "Unable to open %s",
|
|
|
|
res->hr_localpath);
|
2010-02-18 23:16:19 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (fstat(res->hr_localfd, &sb) < 0) {
|
2011-09-27 07:52:39 +00:00
|
|
|
pjdlog_errno(LOG_ERR, "Unable to stat %s", res->hr_localpath);
|
2010-02-18 23:16:19 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
if (S_ISCHR(sb.st_mode)) {
|
|
|
|
/*
|
|
|
|
* If this is character device, it is most likely GEOM provider.
|
|
|
|
*/
|
|
|
|
if (ioctl(res->hr_localfd, DIOCGMEDIASIZE,
|
|
|
|
&res->hr_local_mediasize) < 0) {
|
2011-09-27 07:52:39 +00:00
|
|
|
pjdlog_errno(LOG_ERR,
|
2010-02-18 23:16:19 +00:00
|
|
|
"Unable obtain provider %s mediasize",
|
2011-09-27 07:52:39 +00:00
|
|
|
res->hr_localpath);
|
2010-02-18 23:16:19 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
if (ioctl(res->hr_localfd, DIOCGSECTORSIZE,
|
|
|
|
&res->hr_local_sectorsize) < 0) {
|
2011-09-27 07:52:39 +00:00
|
|
|
pjdlog_errno(LOG_ERR,
|
2010-02-18 23:16:19 +00:00
|
|
|
"Unable obtain provider %s sectorsize",
|
2011-09-27 07:52:39 +00:00
|
|
|
res->hr_localpath);
|
2010-02-18 23:16:19 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
} else if (S_ISREG(sb.st_mode)) {
|
|
|
|
/*
|
|
|
|
* We also support regular files for which we hardcode
|
|
|
|
* sector size of 512 bytes.
|
|
|
|
*/
|
|
|
|
res->hr_local_mediasize = sb.st_size;
|
|
|
|
res->hr_local_sectorsize = 512;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* We support no other file types.
|
|
|
|
*/
|
|
|
|
pjdlog_error("%s is neither GEOM provider nor regular file.",
|
|
|
|
res->hr_localpath);
|
|
|
|
errno = EFTYPE;
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
|
|
|
role2str(int role)
|
|
|
|
{
|
|
|
|
|
2011-03-22 10:39:34 +00:00
|
|
|
switch (role) {
|
|
|
|
case HAST_ROLE_INIT:
|
2010-02-18 23:16:19 +00:00
|
|
|
return ("init");
|
2011-03-22 10:39:34 +00:00
|
|
|
case HAST_ROLE_PRIMARY:
|
2010-02-18 23:16:19 +00:00
|
|
|
return ("primary");
|
2011-03-22 10:39:34 +00:00
|
|
|
case HAST_ROLE_SECONDARY:
|
2010-02-18 23:16:19 +00:00
|
|
|
return ("secondary");
|
|
|
|
}
|
|
|
|
return ("unknown");
|
|
|
|
}
|
2011-01-28 22:33:47 +00:00
|
|
|
|
|
|
|
int
|
2011-05-14 17:02:03 +00:00
|
|
|
drop_privs(struct hast_resource *res)
|
2011-01-28 22:33:47 +00:00
|
|
|
{
|
2011-05-14 17:02:03 +00:00
|
|
|
char jailhost[sizeof(res->hr_name) * 2];
|
|
|
|
struct jail jailst;
|
2011-01-28 22:33:47 +00:00
|
|
|
struct passwd *pw;
|
|
|
|
uid_t ruid, euid, suid;
|
|
|
|
gid_t rgid, egid, sgid;
|
|
|
|
gid_t gidset[1];
|
2011-05-14 17:02:03 +00:00
|
|
|
bool capsicum, jailed;
|
2011-03-21 21:31:50 +00:00
|
|
|
|
2011-01-28 22:33:47 +00:00
|
|
|
/*
|
|
|
|
* According to getpwnam(3) we have to clear errno before calling the
|
|
|
|
* function to be able to distinguish between an error and missing
|
|
|
|
* entry (with is not treated as error by getpwnam(3)).
|
|
|
|
*/
|
|
|
|
errno = 0;
|
|
|
|
pw = getpwnam(HAST_USER);
|
|
|
|
if (pw == NULL) {
|
|
|
|
if (errno != 0) {
|
2011-09-27 07:52:39 +00:00
|
|
|
pjdlog_errno(LOG_ERR,
|
|
|
|
"Unable to find info about '%s' user", HAST_USER);
|
2011-01-28 22:33:47 +00:00
|
|
|
return (-1);
|
|
|
|
} else {
|
|
|
|
pjdlog_error("'%s' user doesn't exist.", HAST_USER);
|
|
|
|
errno = ENOENT;
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
}
|
2011-05-14 17:02:03 +00:00
|
|
|
|
|
|
|
bzero(&jailst, sizeof(jailst));
|
|
|
|
jailst.version = JAIL_API_VERSION;
|
|
|
|
jailst.path = pw->pw_dir;
|
|
|
|
if (res == NULL) {
|
|
|
|
(void)snprintf(jailhost, sizeof(jailhost), "hastctl");
|
|
|
|
} else {
|
|
|
|
(void)snprintf(jailhost, sizeof(jailhost), "hastd: %s (%s)",
|
|
|
|
res->hr_name, role2str(res->hr_role));
|
|
|
|
}
|
|
|
|
jailst.hostname = jailhost;
|
|
|
|
jailst.jailname = NULL;
|
|
|
|
jailst.ip4s = 0;
|
|
|
|
jailst.ip4 = NULL;
|
|
|
|
jailst.ip6s = 0;
|
|
|
|
jailst.ip6 = NULL;
|
|
|
|
if (jail(&jailst) >= 0) {
|
|
|
|
jailed = true;
|
|
|
|
} else {
|
|
|
|
jailed = false;
|
|
|
|
pjdlog_errno(LOG_WARNING,
|
|
|
|
"Unable to jail to directory to %s", pw->pw_dir);
|
|
|
|
if (chroot(pw->pw_dir) == -1) {
|
2011-09-27 07:52:39 +00:00
|
|
|
pjdlog_errno(LOG_ERR,
|
2011-05-14 17:02:03 +00:00
|
|
|
"Unable to change root directory to %s",
|
2011-09-27 07:52:39 +00:00
|
|
|
pw->pw_dir);
|
2011-05-14 17:02:03 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
2011-01-28 22:33:47 +00:00
|
|
|
}
|
|
|
|
PJDLOG_VERIFY(chdir("/") == 0);
|
|
|
|
gidset[0] = pw->pw_gid;
|
|
|
|
if (setgroups(1, gidset) == -1) {
|
2011-09-27 07:52:39 +00:00
|
|
|
pjdlog_errno(LOG_ERR, "Unable to set groups to gid %u",
|
|
|
|
(unsigned int)pw->pw_gid);
|
2011-01-28 22:33:47 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
if (setgid(pw->pw_gid) == -1) {
|
2011-09-27 07:52:39 +00:00
|
|
|
pjdlog_errno(LOG_ERR, "Unable to set gid to %u",
|
|
|
|
(unsigned int)pw->pw_gid);
|
2011-01-28 22:33:47 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
if (setuid(pw->pw_uid) == -1) {
|
2011-09-27 07:52:39 +00:00
|
|
|
pjdlog_errno(LOG_ERR, "Unable to set uid to %u",
|
|
|
|
(unsigned int)pw->pw_uid);
|
2011-01-28 22:33:47 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
2011-05-23 20:59:50 +00:00
|
|
|
/*
|
|
|
|
* Until capsicum doesn't allow ioctl(2) we cannot use it to sandbox
|
|
|
|
* primary and secondary worker processes, as primary uses GGATE
|
|
|
|
* ioctls and secondary uses ioctls to handle BIO_DELETE and BIO_FLUSH.
|
|
|
|
* For now capsicum is only used to sandbox hastctl.
|
|
|
|
*/
|
2011-06-27 09:14:25 +00:00
|
|
|
#ifdef HAVE_CAPSICUM
|
2011-06-27 09:10:48 +00:00
|
|
|
if (res == NULL) {
|
2011-05-14 17:02:03 +00:00
|
|
|
capsicum = (cap_enter() == 0);
|
2011-06-27 09:10:48 +00:00
|
|
|
if (!capsicum) {
|
|
|
|
pjdlog_common(LOG_DEBUG, 1, errno,
|
|
|
|
"Unable to sandbox using capsicum");
|
|
|
|
}
|
|
|
|
} else
|
2011-06-27 09:14:25 +00:00
|
|
|
#endif
|
2011-05-14 17:02:03 +00:00
|
|
|
capsicum = false;
|
2011-05-14 16:55:24 +00:00
|
|
|
|
2011-01-28 22:33:47 +00:00
|
|
|
/*
|
|
|
|
* Better be sure that everything succeeded.
|
|
|
|
*/
|
|
|
|
PJDLOG_VERIFY(getresuid(&ruid, &euid, &suid) == 0);
|
|
|
|
PJDLOG_VERIFY(ruid == pw->pw_uid);
|
|
|
|
PJDLOG_VERIFY(euid == pw->pw_uid);
|
|
|
|
PJDLOG_VERIFY(suid == pw->pw_uid);
|
|
|
|
PJDLOG_VERIFY(getresgid(&rgid, &egid, &sgid) == 0);
|
|
|
|
PJDLOG_VERIFY(rgid == pw->pw_gid);
|
|
|
|
PJDLOG_VERIFY(egid == pw->pw_gid);
|
|
|
|
PJDLOG_VERIFY(sgid == pw->pw_gid);
|
|
|
|
PJDLOG_VERIFY(getgroups(0, NULL) == 1);
|
|
|
|
PJDLOG_VERIFY(getgroups(1, gidset) == 1);
|
|
|
|
PJDLOG_VERIFY(gidset[0] == pw->pw_gid);
|
|
|
|
|
2011-03-21 21:31:50 +00:00
|
|
|
pjdlog_debug(1,
|
2011-05-14 17:02:03 +00:00
|
|
|
"Privileges successfully dropped using %s%s+setgid+setuid.",
|
|
|
|
capsicum ? "capsicum+" : "", jailed ? "jail" : "chroot");
|
2011-03-21 21:31:50 +00:00
|
|
|
|
2011-01-28 22:33:47 +00:00
|
|
|
return (0);
|
|
|
|
}
|