Meanwhile I successfully tested my kernel modifications that introduced seven 
new basic privileges in OpenSolaris. I used the input of the list for naming 
and semantics and also introduced a new policy when creating objects is allowed.

Please note that this neither the new privileges nor the code of the prototype 
are official in any way. It worked fine for me, it is linted and follows the 
correct style and I tested it with my test suite but if the code or the new 
privileges will be accepted is beyond my competence.

The list only came to the point in an earlier discussion that I should write a 
prototype for a file system in order to understand the new basic privileges.

The currently new introduced privileges are the following:


--------------
basic privilege PRIV_FILE_NANON_READ

        Without having set PRIV_FILE_NANON_READ, a process is only able
        to perform read operations on globally readable files or directories
        because it can only act like an 'anonymous process' and cannot benefit
        from its euid, egid or group memberships.
        Additional rights gained through PRIV_FILE_DAC_READ will not be
        restricted if PRIV_FILE_NANON_READ is not set.

basic privilege PRIV_FILE_NANON_WRITE

        Without having set PRIV_FILE_NANON_WRITE, a process is only able
        to perform write operations on globally writable files or directories
        because it can only act like an 'anonymous process' and cannot benefit
        from its euid, egid or group memberships.
        Additional rights gained through PRIV_FILE_DAC_WRITE will not be
        restricted if PRIV_FILE_NANON_WRITE is not set.

basic privilege PRIV_FILE_NANON_EXECUTE

        Without having set PRIV_FILE_NANON_EXECUTE, a process is only
        able to perform execute operations on globally executable files because
        it can only act like an 'anonymous process' and cannot benefit from its
        euid, egid or group memberships.
        Additional rights gained through PRIV_FILE_DAC_EXECUTE will not be
        restricted if PRIV_FILE_NANON_EXECUTE is not set.

basic privilege PRIV_FILE_NANON_SEARCH

        Without having set PRIV_FILE_NANON_SEARCH, a process is only
        able to perform search operations on globally searchable directories
        because it can only act like an 'anonymous process' and cannot benefit
        from its euid, egid or associated groups.
        Additional rights gained through PRIV_FILE_DAC_SEARCH will not be
        restricted if PRIV_FILE_NANON_EXECUTE is not set.

basic privilege PRIV_FILE_NANON_OWNER

        PRIV_FILE_NANON_OWNER allows a process to perform operations on
        a file, directory or link that require ownership.
        PRIV_FILE_OWNER may substitute PRIV_FILE_NANON_OWNER.
        Without having set at least one of both privileges, a process is
        considered to be 'anonymous' and cannot benefit from its euid.
        Affected operations are e. g. changing permission bits/acls, changing
        access and modification times, changing the gid of an owned file or
        directory when a process is member of this group, creating hardlinks to
        files owned by a UID equal to a process's effective UID, renaming or
        moving in a directory with the sticky bit and creating of a new file,
        directory or symbolic link.
        To change permission bits/acls of an owned file PRIV_FILE_NANON_READ
        or PRIV_FILE_DAC_READ, PRIV_FILE_NANON_WRITE or PRIV_FILE_DAC_WRITE and
        PRIV_FILE_ANON_EXECUTE or PRIF_FILE_DAC_EXECUTE have to be set as well.
        To change permission bits/acls of an owned directory
        PRIV_FILE_NANON_READ or PRIV_FILE_DAC_READ, PRIV_FILE_NANON_WRITE or
        PRIV_FILE_DAC_WRITE and PRIV_FILE_ANON_SEARCH or PRIF_FILE_DAC_SEARCH
        have to be set as well.
        To change the gid of an owned file or directory when a process is
        member of this group, at least one of PRIV_FILE_NANON_OWNER,
        PRIV_FILE_OWNER, PRIV_FILE_CHOWN or PRIV_FILE_CHOWN_SELF has to be set.
        So privilege escalation due to permission changes are not possible.
        If a new file should be created PRIV_FILE_NANON_READ or
        PRIV_FILE_DAC_READ, PRIV_FILE_NANON_WRITE or PRIV_FILE_DAC_WRITE and
        PRIV_FILE_ANON_EXECUTE or PRIF_FILE_DAC_EXECUTE have to be set as well.
        If a directory should be created PRIV_FILE_NANON_READ or
        PRIV_FILE_DAC_READ, PRIV_FILE_NANON_WRITE or PRIV_FILE_DAC_WRITE and
        PRIV_FILE_ANON_SEARCH or PRIF_FILE_DAC_SEARCH have to be set as well.
        So a process that was able to create a file or directory is always able
        to reopen or enter it later as long no privileges are removed
        from its effective set.
        Additional rights gained through PRIV_FILE_OWNER will not be restricted
        by PRIV_FILE_NANON_OWNER.

basic privilege PRIV_FILE_GEN_RES

        Without having set PRIV_FILE_GEN_RES, file or directory
        operations that require read/execute/search permissions will generally
        not possible unless the corresponding
        PRIV_FILE_DAC_{READ|EXECUTE|SEARCH} privileges are set.
        Set PRIV_FILE_NANON_{READ|EXECUTE|SEARCH} privileges will be
        ignored.

basic privilege PRIV_FILE_GEN_WRITE

        Without having set PRIV_FILE_GEN_WRITE, file or directory
        operations that require write permissions will not be possible at all
        unless the PRIV_FILE_DAC_WRITE privilege is set.
        A set PRIV_FILE_NANON_WRITE privilege will be ignored.


-------------------

With this approach, it is easy to deny read/write file access at all but you 
also have the possibility to allow file access to globally readable/writable 
files only, that means switching your process to "anonymous" mode.

All new privileges are already integrated and tested in my tmpfs prototyppe, 
all file systems that call secpolicy_vnode_setattr are also influenced in their 
behaviour (this applies to chown, utime, chgrp and chmod).

You may review the code under http://myhpi.de/~nicolai/webrev/ as a webrev. 
Please tell me what you think about it.
If you are interested in a rudimentary test suite, let me know as well.

The next consequent steps for me would be to modify some programs like 
ssh-agent to use the new privileges. Please tell me your ideas if you think 
another program should drop them too.

Furthermore, I have developed a procedure to integrate the new privileges in 
other file systems as well (chown, utime, chgrp and chmod work as expected for 
every file system but I need to modify the access- and create- functions for 
every single file system).
Because my system is entirely UFS-based, I will modify this fs at first.

If you like to help with my prototype and integrate the changes in your 
favourite file system, please let me know that I can tell you the exact 
procedure in order not to miss a bit.

Please feel free to comment on any issue you see with the prototype or the new 
privileges.

Thanks a lot

Johannes Nicolai
Open Solaris Summer of Code Student

Reply via email to