summaryrefslogtreecommitdiff
path: root/sandbox-solaris.c
diff options
context:
space:
mode:
Diffstat (limited to 'sandbox-solaris.c')
-rw-r--r--sandbox-solaris.c108
1 files changed, 108 insertions, 0 deletions
diff --git a/sandbox-solaris.c b/sandbox-solaris.c
new file mode 100644
index 000000000..343a01022
--- /dev/null
+++ b/sandbox-solaris.c
@@ -0,0 +1,108 @@
1/*
2 * Copyright (c) 2015 Joyent, Inc
3 * Author: Alex Wilson <alex.wilson@joyent.com>
4 *
5 * Permission to use, copy, modify, and distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
8 *
9 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16 */
17
18#include "includes.h"
19
20#ifdef SANDBOX_SOLARIS
21#ifndef USE_SOLARIS_PRIVS
22# error "--with-solaris-privs must be used with the Solaris sandbox"
23#endif
24
25#include <sys/types.h>
26
27#include <errno.h>
28#include <stdarg.h>
29#include <stdio.h>
30#include <stdlib.h>
31#include <string.h>
32#include <unistd.h>
33#ifdef HAVE_PRIV_H
34# include <priv.h>
35#endif
36
37#include "log.h"
38#include "ssh-sandbox.h"
39#include "xmalloc.h"
40
41struct ssh_sandbox {
42 priv_set_t *pset;
43};
44
45struct ssh_sandbox *
46ssh_sandbox_init(struct monitor *monitor)
47{
48 struct ssh_sandbox *box = NULL;
49
50 box = xcalloc(1, sizeof(*box));
51
52 /* Start with "basic" and drop everything we don't need. */
53 box->pset = solaris_basic_privset();
54
55 if (box->pset == NULL) {
56 free(box);
57 return NULL;
58 }
59
60 /* Drop everything except the ability to use already-opened files */
61 if (priv_delset(box->pset, PRIV_FILE_LINK_ANY) != 0 ||
62#ifdef PRIV_NET_ACCESS
63 priv_delset(box->pset, PRIV_NET_ACCESS) != 0 ||
64#endif
65 priv_delset(box->pset, PRIV_PROC_EXEC) != 0 ||
66 priv_delset(box->pset, PRIV_PROC_FORK) != 0 ||
67 priv_delset(box->pset, PRIV_PROC_INFO) != 0 ||
68 priv_delset(box->pset, PRIV_PROC_SESSION) != 0) {
69 free(box);
70 return NULL;
71 }
72
73 /* These may not be available on older Solaris-es */
74# if defined(PRIV_FILE_READ) && defined(PRIV_FILE_WRITE)
75 if (priv_delset(box->pset, PRIV_FILE_READ) != 0 ||
76 priv_delset(box->pset, PRIV_FILE_WRITE) != 0) {
77 free(box);
78 return NULL;
79 }
80# endif
81
82 return box;
83}
84
85void
86ssh_sandbox_child(struct ssh_sandbox *box)
87{
88 if (setppriv(PRIV_SET, PRIV_PERMITTED, box->pset) != 0 ||
89 setppriv(PRIV_SET, PRIV_LIMIT, box->pset) != 0 ||
90 setppriv(PRIV_SET, PRIV_INHERITABLE, box->pset) != 0)
91 fatal("setppriv: %s", strerror(errno));
92}
93
94void
95ssh_sandbox_parent_finish(struct ssh_sandbox *box)
96{
97 priv_freeset(box->pset);
98 box->pset = NULL;
99 free(box);
100}
101
102void
103ssh_sandbox_parent_preauth(struct ssh_sandbox *box, pid_t child_pid)
104{
105 /* Nothing to do here */
106}
107
108#endif /* SANDBOX_SOLARIS */