34 Commits

Author SHA1 Message Date
danger
7be8f2924b - Fix include path, these functions were moved to sys/priv.h.
Approved by:	re (bmah)
Submitted by:	sbahra@hpcl.seas.gwu.edu (via #bsddocs@EFnet)
Pointy hat to:	rwatson
2007-08-30 15:03:21 +00:00
rwatson
c075d60f4c Update suser(9) and priv(9) to document that the 'flags' argument is now
unused -- SUSER_RUID and SUSER_ALLOWJAIL are no longer defined or used.

Approved by:	re (bmah)
2007-06-26 23:12:05 +00:00
imp
9aa901e25f Julian says that he doesn't need the advertising clause, so out it goes. 2007-01-09 04:17:20 +00:00
ru
044b6ca4cf Bump document date. 2006-11-06 14:26:43 +00:00
rwatson
7288104e20 Add a new priv(9) kernel interface for checking the availability of
privilege for threads and credentials.  Unlike the existing suser(9)
interface, priv(9) exposes a named privilege identifier to the privilege
checking code, allowing more complex policies regarding the granting of
privilege to be expressed.  Two interfaces are provided, replacing the
existing suser(9) interface:

suser(td)                 ->   priv_check(td, priv)
suser_cred(cred, flags)   ->   priv_check_cred(cred, priv, flags)

A comprehensive list of currently available kernel privileges may be
found in priv.h.  New privileges are easily added as required, but the
comments on adding privileges found in priv.h and priv(9) should be read
before doing so.

The new privilege interface exposed sufficient information to the
privilege checking routine that it will now be possible for jail to
determine whether a particular privilege is granted in the check routine,
rather than relying on hints from the calling context via the
SUSER_ALLOWJAIL flag.  For now, the flag is maintained, but a new jail
check function, prison_priv_check(), is exposed from kern_jail.c and used
by the privilege check routine to determine if the privilege is permitted
in jail.  As a result, a centralized list of privileges permitted in jail
is now present in kern_jail.c.

The MAC Framework is now also able to instrument privilege checks, both
to deny privileges otherwise granted (mac_priv_check()), and to grant
privileges otherwise denied (mac_priv_grant()), permitting MAC Policy
modules to implement privilege models, as well as control a much broader
range of system behavior in order to constrain processes running with
root privilege.

The suser() and suser_cred() functions remain implemented, now in terms
of priv_check() and the PRIV_ROOT privilege, for use during the transition
and possibly continuing use by third party kernel modules that have not
been updated.  The PRIV_DRIVER privilege exists to allow device drivers to
check privilege without adopting a more specific privilege identifier.

This change does not modify the actual security policy, rather, it
modifies the interface for privilege checks so changes to the security
policy become more feasible.

Sponsored by:		nCircle Network Security, Inc.
Obtained from:		TrustedBSD Project
Discussed on:		arch@
Reviewed (at least in part) by:	mlaier, jmg, pjd, bde, ceri,
			Alex Lyashkov <umka at sevcity dot net>,
			Skip Ford <skip dot ford at verizon dot net>,
			Antoine Brodin <antoine dot brodin at laposte dot net>
2006-11-06 13:37:19 +00:00
keramida
955080c0be Consistently use `superuser privileges' instead of its singular
form here and its plural there.

Submitted by:	Rostislav Krasny <rosti.bsd@gmail.com>
MFC after: 	3 days
2006-05-16 22:58:43 +00:00
ru
024faad271 Scheduled mdoc(7) sweep. 2005-01-12 21:48:25 +00:00
krion
2a6aa55a95 Remove trailing spaces.
Reviewed by:	brueffer
MFC after:	3 days
2005-01-02 18:20:29 +00:00
simon
dbcc99d05d mdoc(7) janitor:
- Fix hard sentence breaks.

MFC after:	3 days
2004-08-21 12:58:09 +00:00
cperciva
d9fecc83c8 Rename suser_cred()'s PRISON_ROOT flag to SUSER_ALLOWJAIL. This is
somewhat clearer, but more importantly allows for a consistent naming
scheme for suser_cred flags.

The old name is still defined, but will be removed in a few days (unless I
hear any complaints...)

Discussed with:	rwatson, scottl
Requested by:	jhb
2004-07-26 07:24:04 +00:00
cperciva
ddcdcc894f Document the SUSER_RUID flag.
Reminded by:	pjd
2004-07-17 15:21:34 +00:00
cperciva
4c108fff2d Add a BUGS entry pointing out that the ASU flag isn't being set. This was
disabled by rwatson in revision 1.60 of sys/kern/kern_prot.c in August 2000.
2004-07-17 15:14:43 +00:00
ru
65e663b7dd - Overdue bump of the document date.
- Fixed markup.
- Minor wordsmithing.
2004-04-06 19:49:21 +00:00
hmp
9b05395427 Mdoc Janitor:
* Fix hard sentence breaks.
2003-10-23 02:33:03 +00:00
jhb
768e95c4a8 - Update to new suser() API.
- Spell privilege properly.
- Grammar nits.
2002-04-02 16:41:11 +00:00
davidc
6b067561b6 Update function definitions and required include files to reflect
the current state of the system.

Approved by: alfred
2001-12-26 23:14:04 +00:00
ru
623da62a5a mdoc(7) police: Use the new .In macro for #include statements. 2001-10-01 16:09:29 +00:00
schweikh
511e378b14 Removed whitespace at end-of-line; no content changes. I simply did
cd src/share; find man[1-9] -type f|xargs perl -pi -e 's/[ \t]+$//'

BTW, what editors are the culprits? I'm using vim and it shows
me whitespace at EOL in troff files with a thick blue block...

Reviewed by:	Silence from cvs diff -b
MFC after:	7 days
2001-07-14 19:41:16 +00:00
ru
9001bc7070 mdoc(7) police: removed HISTORY info from the .Os call. 2001-07-10 15:31:11 +00:00
bde
38a7348ede Fixed bitrot in synopsis (some const poisoning had not reached here). 2001-02-15 12:27:11 +00:00
ru
ee79097019 mdoc(7) police: use canonical form of .Dd macro. 2000-12-11 15:47:53 +00:00
ru
e75ab20d6b mdoc(7) police: Er macro usage cleanup. 2000-11-22 16:11:48 +00:00
phk
ff5cdfae2d Move suser() and suser_xxx() prototypes and a related #define from
<sys/proc.h> to <sys/systm.h>.

Correctly document the #includes needed in the manpage.

Add one now needed #include of <sys/systm.h>.
Remove the consequent 48 unused #includes of <sys/proc.h>.
2000-10-29 16:06:56 +00:00
sheldonh
01355e8af4 Clear extraneous arguments to the name (Nm) macro.
Mark PRISON_ROOT and EPERM as defined values (Dv).
2000-08-17 08:17:16 +00:00
markm
6e8b42e205 Grammar police; make the English style more consistent throughout,
and give suser_xxx some more airtime.
2000-08-16 19:52:03 +00:00
peter
76f0c923fe $Id$ -> $FreeBSD$ 1999-08-28 00:22:10 +00:00
mpp
9d0120cf53 Fix some typos and do some minor mdoc cleanup. 1999-06-27 02:38:46 +00:00
bde
9a9fd043b2 Fixed bitrot in synopsis (a missing include). 1999-06-02 16:33:22 +00:00
phk
ca21a25f17 This Implements the mumbled about "Jail" feature.
This is a seriously beefed up chroot kind of thing.  The process
is jailed along the same lines as a chroot does it, but with
additional tough restrictions imposed on what the superuser can do.

For all I know, it is safe to hand over the root bit inside a
prison to the customer living in that prison, this is what
it was developed for in fact:  "real virtual servers".

Each prison has an ip number associated with it, which all IP
communications will be coerced to use and each prison has its own
hostname.

Needless to say, you need more RAM this way, but the advantage is
that each customer can run their own particular version of apache
and not stomp on the toes of their neighbors.

It generally does what one would expect, but setting up a jail
still takes a little knowledge.

A few notes:

   I have no scripts for setting up a jail, don't ask me for them.

   The IP number should be an alias on one of the interfaces.

   mount a /proc in each jail, it will make ps more useable.

   /proc/<pid>/status tells the hostname of the prison for
   jailed processes.

   Quotas are only sensible if you have a mountpoint per prison.

   There are no privisions for stopping resource-hogging.

   Some "#ifdef INET" and similar may be missing (send patches!)

If somebody wants to take it from here and develop it into
more of a "virtual machine" they should be most welcome!

Tools, comments, patches & documentation most welcome.

Have fun...

Sponsored by:   http://www.rndassociates.com/
Run for almost a year by:       http://www.servetheweb.com/
1999-04-28 11:38:52 +00:00
bde
a6e05ea1ce Fixed a missing #include in the synopsis. 1998-01-16 18:06:23 +00:00
jmg
89d737b98c add missing cvs Id lines 1997-03-07 02:53:37 +00:00
mpp
d6dadb5ec6 Minor formatting/style fixes.
Submitted by:	Sandro Sigala <sandro@cat.local.net> as part of PR # 2134
1996-12-09 07:45:59 +00:00
mpp
8a8372d5f1 Correct some spelling errors. 1996-12-01 00:25:06 +00:00
julian
e1e791b5e9 add a man page for suser() because its usage is not as obvious
as you would first think.
1996-10-16 21:14:32 +00:00