summaryrefslogtreecommitdiff
path: root/sys/kern/kern_pledge.c
diff options
context:
space:
mode:
authorTheo de Raadt <deraadt@cvs.openbsd.org>2022-07-17 03:17:02 +0000
committerTheo de Raadt <deraadt@cvs.openbsd.org>2022-07-17 03:17:02 +0000
commit410d3c9cb7c93ed3d0d376906a29b41b04cc13c3 (patch)
tree64975c68a8a992f6905f4fc482f68d1e40dec1ba /sys/kern/kern_pledge.c
parent405b1522fcdecf3a8503c49cc5853a80fb96852f (diff)
the PLEDGE_YPACTIVE "hack" bit related to "getpw" pledge goes away. libc
no longer does accesses /var/run/ypbind.lock to trigger extra permissions for userland-opening of files & sockets to engage with ypserver for YP/LDAP lookups. libc now uses the super secret special ypconnect() system call to perform socket-setup. Delete some other things which are no longer reached via libc/rpc ok jmatthew, miod
Diffstat (limited to 'sys/kern/kern_pledge.c')
-rw-r--r--sys/kern/kern_pledge.c81
1 files changed, 16 insertions, 65 deletions
diff --git a/sys/kern/kern_pledge.c b/sys/kern/kern_pledge.c
index 148a7197608..02a5f308125 100644
--- a/sys/kern/kern_pledge.c
+++ b/sys/kern/kern_pledge.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: kern_pledge.c,v 1.286 2022/07/15 17:25:18 deraadt Exp $ */
+/* $OpenBSD: kern_pledge.c,v 1.287 2022/07/17 03:17:01 deraadt Exp $ */
/*
* Copyright (c) 2015 Nicholas Marriott <nicm@openbsd.org>
@@ -169,7 +169,7 @@ const uint64_t pledge_syscalls[SYS_MAXSYSCALL] = {
[SYS_pwrite] = PLEDGE_STDIO,
[SYS_pwritev] = PLEDGE_STDIO,
[SYS_recvmsg] = PLEDGE_STDIO,
- [SYS_recvfrom] = PLEDGE_STDIO | PLEDGE_YPACTIVE,
+ [SYS_recvfrom] = PLEDGE_STDIO,
[SYS_ftruncate] = PLEDGE_STDIO,
[SYS_lseek] = PLEDGE_STDIO,
[SYS_fpathconf] = PLEDGE_STDIO,
@@ -190,7 +190,7 @@ const uint64_t pledge_syscalls[SYS_MAXSYSCALL] = {
* Address selection required a network pledge ("inet",
* "unix", "dns".
*/
- [SYS_sendto] = PLEDGE_STDIO | PLEDGE_YPACTIVE,
+ [SYS_sendto] = PLEDGE_STDIO,
/*
* Address specification required a network pledge ("inet",
@@ -361,17 +361,17 @@ const uint64_t pledge_syscalls[SYS_MAXSYSCALL] = {
[SYS_lchown] = PLEDGE_CHOWN,
[SYS_fchown] = PLEDGE_CHOWN,
- [SYS_socket] = PLEDGE_INET | PLEDGE_UNIX | PLEDGE_DNS | PLEDGE_YPACTIVE,
- [SYS_connect] = PLEDGE_INET | PLEDGE_UNIX | PLEDGE_DNS | PLEDGE_YPACTIVE,
- [SYS_bind] = PLEDGE_INET | PLEDGE_UNIX | PLEDGE_DNS | PLEDGE_YPACTIVE,
- [SYS_getsockname] = PLEDGE_INET | PLEDGE_UNIX | PLEDGE_DNS | PLEDGE_YPACTIVE,
+ [SYS_socket] = PLEDGE_INET | PLEDGE_UNIX | PLEDGE_DNS,
+ [SYS_connect] = PLEDGE_INET | PLEDGE_UNIX | PLEDGE_DNS,
+ [SYS_bind] = PLEDGE_INET | PLEDGE_UNIX | PLEDGE_DNS,
+ [SYS_getsockname] = PLEDGE_INET | PLEDGE_UNIX | PLEDGE_DNS,
[SYS_listen] = PLEDGE_INET | PLEDGE_UNIX,
[SYS_accept4] = PLEDGE_INET | PLEDGE_UNIX,
[SYS_accept] = PLEDGE_INET | PLEDGE_UNIX,
[SYS_getpeername] = PLEDGE_INET | PLEDGE_UNIX,
- [SYS_flock] = PLEDGE_FLOCK | PLEDGE_YPACTIVE,
+ [SYS_flock] = PLEDGE_FLOCK,
[SYS_ypconnect] = PLEDGE_GETPW,
@@ -655,17 +655,6 @@ pledge_namei(struct proc *p, struct nameidata *ni, char *origpath)
ni->ni_cnd.cn_flags |= BYPASSUNVEIL;
return (0);
}
-
- /* XXX delete chunk after ypconnect() is established */
- /* when avoiding YP mode, getpw* functions touch this */
- if (ni->ni_pledge == PLEDGE_RPATH &&
- strcmp(path, "/var/run/ypbind.lock") == 0) {
- if (pledge & PLEDGE_GETPW) {
- ni->ni_cnd.cn_flags |= BYPASSUNVEIL;
- return (0);
- } else
- return (pledge_fail(p, error, PLEDGE_GETPW));
- }
break;
case SYS_open:
/* daemon(3) or other such functions */
@@ -700,6 +689,11 @@ pledge_namei(struct proc *p, struct nameidata *ni, char *origpath)
ni->ni_cnd.cn_flags |= BYPASSUNVEIL;
return (0);
}
+ if (strncmp(path, "/var/yp/binding/",
+ sizeof("/var/yp/binding/") - 1) == 0) {
+ ni->ni_cnd.cn_flags |= BYPASSUNVEIL;
+ return (0);
+ }
}
/* DNS needs /etc/{resolv.conf,hosts,services,protocols}. */
@@ -723,29 +717,6 @@ pledge_namei(struct proc *p, struct nameidata *ni, char *origpath)
}
}
- if ((ni->ni_pledge == PLEDGE_RPATH) &&
- (pledge & PLEDGE_GETPW)) {
- /* XXX delete chunk after ypconnect() is established */
- if (strcmp(path, "/var/run/ypbind.lock") == 0) {
- /*
- * XXX
- * The current hack for YP support in "getpw"
- * is to enable some "inet" features until
- * next pledge call.
- */
- mtx_enter(&p->p_p->ps_mtx);
- p->p_p->ps_pledge |= PLEDGE_YPACTIVE;
- mtx_leave(&p->p_p->ps_mtx);
- ni->ni_cnd.cn_flags |= BYPASSUNVEIL;
- return (0);
- }
- if (strncmp(path, "/var/yp/binding/",
- sizeof("/var/yp/binding/") - 1) == 0) {
- ni->ni_cnd.cn_flags |= BYPASSUNVEIL;
- return (0);
- }
- }
-
/* tzset() needs these. */
if ((ni->ni_pledge == PLEDGE_RPATH) &&
strncmp(path, "/usr/share/zoneinfo/",
@@ -1084,7 +1055,7 @@ pledge_sendit(struct proc *p, const void *to)
if ((p->p_p->ps_flags & PS_PLEDGE) == 0)
return (0);
- if ((p->p_p->ps_pledge & (PLEDGE_INET | PLEDGE_UNIX | PLEDGE_DNS | PLEDGE_YPACTIVE)))
+ if ((p->p_p->ps_pledge & (PLEDGE_INET | PLEDGE_UNIX | PLEDGE_DNS)))
return (0); /* may use address */
if (to == NULL)
return (0); /* behaves just like write */
@@ -1418,7 +1389,7 @@ pledge_sockopt(struct proc *p, int set, int level, int optname)
}
}
- if ((pledge & (PLEDGE_INET|PLEDGE_UNIX|PLEDGE_DNS|PLEDGE_YPACTIVE)) == 0)
+ if ((pledge & (PLEDGE_INET|PLEDGE_UNIX|PLEDGE_DNS)) == 0)
return pledge_fail(p, EPERM, PLEDGE_INET);
/* In use by some service libraries */
switch (level) {
@@ -1442,25 +1413,6 @@ pledge_sockopt(struct proc *p, int set, int level, int optname)
}
}
- /* YP may do these requests */
- if (pledge & PLEDGE_YPACTIVE) {
- switch (level) {
- case IPPROTO_IP:
- switch (optname) {
- case IP_PORTRANGE:
- return (0);
- }
- break;
-
- case IPPROTO_IPV6:
- switch (optname) {
- case IPV6_PORTRANGE:
- return (0);
- }
- break;
- }
- }
-
if ((pledge & (PLEDGE_INET|PLEDGE_UNIX)) == 0)
return pledge_fail(p, EPERM, PLEDGE_INET);
switch (level) {
@@ -1558,8 +1510,7 @@ pledge_socket(struct proc *p, int domain, unsigned int state)
return (0);
case AF_INET:
case AF_INET6:
- if (ISSET(pledge, PLEDGE_INET) ||
- ISSET(pledge, PLEDGE_YPACTIVE))
+ if (ISSET(pledge, PLEDGE_INET))
return 0;
return pledge_fail(p, EPERM, PLEDGE_INET);