Revamp issuid()

This commit is contained in:
Nicolas Williams
2017-04-17 16:43:26 -05:00
committed by Viktor Dukhovni
parent 650ffdc964
commit 90110f5553
2 changed files with 120 additions and 215 deletions

View File

@@ -40,207 +40,92 @@
#include <errno.h>
#include "roken.h"
#include "getauxval.h"
/* NetBSD calls AT_UID AT_RUID. Everyone else calls it AT_UID. */
#if defined(AT_EUID) && defined(AT_RUID) && !defined(AT_UID)
#define AT_UID AT_RUID
#endif
#if defined(AT_EGID) && defined(AT_RGID) && !defined(AT_GID)
#define AT_GID AT_RGID
#endif
#ifdef __GLIBC__
#ifdef __GLIBC_PREREQ
#define HAVE_GLIBC_API_VERSION_SUPPORT(maj, min) __GLIBC_PREREQ(maj, min)
#else
#define HAVE_GLIBC_API_VERSION_SUPPORT(maj, min) \
((__GLIBC << 16) + GLIBC_MINOR >= ((maj) << 16) + (min))
#endif
/*
* Do change this check in order to manually test rk_getauxval() for
* older glibcs.
*/
#if HAVE_GLIBC_API_VERSION_SUPPORT(2, 19)
#define GETAUXVAL_SETS_ERRNO
#endif
#endif
/**
* Like the nearly-standard getauxval(), but reads through
* /proc/self/auxv if it exists (this works on Linux, and, by code
* inspection, on FreeBSD, but not Solaris/Illumos, where the auxv type
* is an int and the value is a union of long, data pointer, and
* function pointer), otherwise it sets errno to ENOENT and returns
* zero. If the auxval is not found returns zero and always sets errno
* to ENOENT. Otherwise if auxval is found it leaves errno as it was,
* even if the value is zero.
*
* @return The value of the ELF auxiliary value for the given type.
*/
ROKEN_LIB_FUNCTION unsigned long ROKEN_LIB_CALL
rk_getprocauxval(unsigned long type)
{
static int has_proc_auxv = 1;
unsigned long a[2];
ssize_t bytes;
int save_errno = errno;
int fd;
if (!has_proc_auxv) {
errno = ENOENT;
return 0;
}
if ((fd = open("/proc/self/auxv", O_RDONLY)) == -1) {
if (errno == ENOENT)
has_proc_auxv = 0;
errno = ENOENT;
return 0;
}
/* FIXME: Make this work on Illumos */
do {
if ((bytes = read(fd, a, sizeof(a))) != sizeof(a))
break;
if (a[0] == type) {
(void) close(fd);
errno = save_errno;
return a[1];
}
} while (bytes == sizeof(a) && (a[0] != 0 || a[1] != 0));
(void) close(fd);
errno = ENOENT;
return 0;
}
/**
* Like the nearly-standard getauxval(). If the auxval is not found
* returns zero and always sets errno to ENOENT. Otherwise if auxval is
* found it leaves errno as it was, even if the value is zero.
*
* @return The value of the ELF auxiliary value for the given type.
*/
ROKEN_LIB_FUNCTION unsigned long ROKEN_LIB_CALL
rk_getauxval(unsigned long type)
{
#ifdef HAVE_GETAUXVAL
#ifdef GETAUXVAL_SETS_ERRNO
return getauxval(type);
#else
unsigned long ret;
unsigned long ret2;
static int getauxval_sets_errno = -1;
int save_errno = errno;
errno = 0;
ret = getauxval(type);
if (ret != 0 || errno == ENOENT || getauxval_sets_errno == 1) {
if (ret != 0)
errno = save_errno;
else if (getauxval_sets_errno && errno == 0)
errno = save_errno;
return ret;
}
if (!getauxval_sets_errno) {
errno = save_errno;
return rk_getprocauxval(type);
}
errno = 0;
ret2 = getauxval(~type); /* Hacky, quite hacky */
if (ret2 == 0 && errno == ENOENT) {
getauxval_sets_errno = 1;
errno = save_errno;
return ret; /* Oh, it does set errno. Good! */
}
errno = save_errno;
getauxval_sets_errno = 0;
return rk_getprocauxval(type);
#endif
#else
return rk_getprocauxval(type);
#endif
}
extern int rk_injected_auxv;
/**
* Returns non-zero if the caller's process started as set-uid or
* set-gid (and therefore the environment cannot be trusted).
*
* As much as possible this implements the same functionality and
* semantics as OpenBSD's issetugid() (as opposed to FreeBSD's).
*
* Preserves errno.
*
* @return Non-zero if the environment is not trusted.
*/
ROKEN_LIB_FUNCTION int ROKEN_LIB_CALL
issuid(void)
{
#ifdef WIN32
return 0; /* No set-id programs or anything like it on Windows */
#else
/*
* We want to use issetugid(), but issetugid() is not the same on
* all OSes.
*
* On Illumos derivatives, OpenBSD, and Solaris issetugid() returns
* true IFF the program exec()ed was set-uid or set-gid.
* On OpenBSD (where issetugid() originated), Illumos derivatives,
* and Solaris, issetugid() returns true IFF the program exec()ed
* was set-uid or set-gid.
*
* On NetBSD and FreeBSD issetugid() returns true if the program
* exec()ed was set-uid or set-gid, or if the process has switched
* UIDs/GIDs or otherwise changed privileges or is a descendant of
* such a process and has not exec()ed since.
* FreeBSD departed from OpenBSD's issetugid() semantics, and other
* BSDs (NetBSD, DragonFly) and OS X adopted FreeBSD's.
*
* What we want here is to know only if the program exec()ed was
* set-uid or set-gid, so we can decide whether to trust the
* enviroment variables. We don't care if this was a process that
* started as root and later changed UIDs/privs whatever: since it
* started out as privileged, it inherited an environment from a
* privileged pre-exec self, and so on, so the environment is
* trusted.
* FreeBSDs' issetugid() returns true if the program exec()ed was
* set-uid or set-gid, or if the process has switched UIDs/GIDs or
* otherwise changed privileges or is a descendant of such a process
* and has not exec()ed since.
*
* Therefore the FreeBSD/NetBSD issetugid() does us no good.
* The FreeBSD/NetBSD issetugid() does us no good because we _want_
* to trust the environment when the process started life as
* non-set-uid root (or otherwise privileged). There's nothing
* about _dropping_ privileges (without having gained them first)
* that taints the environment. It's not like calling system(),
* say, might change the environment of the caller.
*
* We want OpenBSD's issetugid() semantics.
*
* Linux, meanwhile, has no issetugid() (at least glibc doesn't
* anyways).
* anyways) but has an equivalent: getauxval(AT_SECURE).
*
* Systems that support ELF put an "auxilliary vector" on the stack
* prior to starting the RTLD, and this vector includes (optionally)
* information about the process' EUID, RUID, EGID, RGID, and so on
* at the time of exec(), which we can use to construct proper
* issetugid() functionality. Other useful (and used here) auxv
* types include: AT_SECURE (Linux) and the path to the program
* exec'ed. None of this applies to statically-linked programs
* though.
* To be really specific: we want getauxval(AT_SECURE) semantics
* because there may be ways in which a process might gain privilege
* at exec time other than by exec'ing a set-id program.
*
* Where available, we use the ELF auxilliary vector before trying
* issetugid().
* Where we use getauxval(), we really use our getauxval(), the one
* that isn't broken the way glibc's used to be. Our getauxval()
* also works on more systems than actually provide one.
*
* All of this is as of late March 2017, and might become stale in
* the future.
* In order to avoid FreeBSD issetugid() semantics, where available,
* we use the ELF auxilliary vector to implement OpenBSD semantics
* before finally falling back on issetugid().
*
* All of this is as of April 2017, and might become stale in the
* future.
*/
static int we_are_suid = -1;
static int we_are_suid = -1; /* Memoize; -1 == dunno */
int save_errno = errno;
#if (defined(AT_EUID) && defined(AT_UID)) || (defined(AT_EGID) && defined(AT_GID))
#if defined(AT_EUID) && defined(AT_UID) && defined(AT_EGID) && defined(AT_GID)
int seen = 0;
#endif
if (we_are_suid >= 0)
if (we_are_suid >= 0 && !rk_injected_auxv)
return we_are_suid;
#ifdef AT_SECURE
/*
* AT_SECURE is set if the program was set-id or gained any kind of
* privilege in a similar way.
*/
errno = 0;
if (rk_getauxval(AT_SECURE) != 0) {
errno = save_errno;
return we_are_suid = 1;
}
else if (errno == 0) {
} else if (errno == 0) {
errno = save_errno;
return we_are_suid = 0;
}
/* errno == ENOENT; AT_SECURE not found; fall through */
#endif
#if defined(AT_EUID) && defined(AT_UID)
#if defined(AT_EUID) && defined(AT_UID) && defined(AT_EGID) && defined(AT_GID)
{
unsigned long euid;
unsigned long uid;
@@ -258,8 +143,7 @@ issuid(void)
return we_are_suid = 1;
}
}
#endif
#if defined(AT_EGID) && defined(AT_GID)
/* Check GIDs */
{
unsigned long egid;
unsigned long gid;
@@ -277,58 +161,32 @@ issuid(void)
return we_are_suid = 1;
}
}
#endif
errno = save_errno;
/*
* This pre-processor condition could be all &&s, but that could
* cause a warning that seen is set but never used.
*
* In practice if any one of these four macros is defined then all
* of them will be.
*/
#if (defined(AT_EUID) && defined(AT_UID)) || (defined(AT_EGID) && defined(AT_GID))
if (seen == 15) {
errno = save_errno;
if (seen == 15)
return we_are_suid = 0;
}
#endif
#if defined(HAVE_ISSETUGID)
/*
* If we have issetugid(), use it. Illumos' and OpenBSD's
* issetugid() works correctly.
*
* On NetBSD and FreeBSD, however, issetugid() returns non-zero even
* if the process started as root, not-set-uid, and then later
* called seteuid(), for example, but in that case we'd want to
* trust the environ! So if issetugid() > 0 we want to do something
* else. See below.
*/
/* If issetugid() == 0 then we're definitely OK then */
if (issetugid() == 0)
return we_are_suid = 0;
/* issetugid() == 1 might have been a false positive; fall through */
#endif /* USE_RK_GETAUXVAL */
#if defined(AT_EXECFN) || defined(AT_EXECPATH)
/*
* There's an auxval by which to find the path of the program this
* process exec'ed.
*
* Linux calls this AT_EXECFN. FreeBSD calls it AT_EXECPATH. NetBSD
* and Illumos call it AT_SUN_EXECNAME.
*
* We can stat it. If the program did a chroot() and the chroot has
* a program with the same path but not set-uid/set-gid, of course,
* we lose here. But a) that's a bit of a stretch, b) there's not
* much more we can do here.
*/
#if defined(AT_EXECFN) && !defined(AT_EXECPATH)
#define AT_EXECPATH AT_EXECFN
#endif
#if defined(AT_SUN_EXECNAME) && !defined(AT_EXECPATH)
#define AT_EXECPATH AT_EXECFN
#endif
#ifdef AT_EXECFN
/*
* There's an auxval by which to find the path of the program this
* process exec'ed.
*
* We can stat() it. If the program did a chroot() and the chroot
* has a program with the same path but not set-uid/set-gid, of
* course, we lose here. But a) that's a bit of a stretch, b)
* there's not much more we can do here.
*
* Also, this is technically a TOCTOU race, though for set-id
* programs this is exceedingly unlikely to be an actual TOCTOU
* race.
*/
{
unsigned long p = getauxval(AT_EXECPATH);
struct stat st;
@@ -343,27 +201,25 @@ issuid(void)
return we_are_suid = 0;
}
}
/* Fall through */
#endif
/*
* Fall through if we have rk_getauxval() but we didn't have (or
* don't know if we don't have) the aux entries that we needed.
* We're done with it.
*/
#if defined(HAVE_ISSETUGID)
errno = save_errno;
return we_are_suid = 1;
#else
/*
* Paranoia: for extra safety we ought to default to returning 1.
*
* But who knows what that might break where users link statically
* (so no auxv), say. Also, on Windows we should always return 0.
* (so no auxv), say.
*
* We'll check the actual real and effective IDs (as opposed to the
* ones at main() start time.
*
* For now we stick to returning zero by default. We've been rather
* heroic above trying to find out if we're suid.
* heroic above trying to find out if we're suid, and we're running
* on a rather old or uncool OS if we've gotten here.
*/
#if defined(HAVE_GETRESUID)
@@ -416,4 +272,5 @@ issuid(void)
errno = save_errno;
return we_are_suid = 0;
#endif /* !defined(HAVE_ISSETUGID) */
#endif /* WIN32 */
}

View File

@@ -43,6 +43,49 @@
#include "roken.h"
#include "getauxval.h"
static void
inject_suid(int suid)
{
#if defined(AT_SECURE) || (defined(AT_EUID) && defined(AT_RUID) && defined(AT_EGID) && defined(AT_RGID))
auxv_t e;
#ifdef AT_SECURE
unsigned long secure = suid ? 1 : 0;
#endif
#if defined(AT_EUID) && defined(AT_RUID) && defined(AT_EGID) && defined(AT_RGID)
unsigned long eid = suid ? 0 : 1000;
/* Inject real UID and GID */
e.a_un.a_val = 1000;
e.a_type = AT_UID;
if ((errno = rk_injectauxv(&e)) != 0)
err(1, "rk_injectauxv(AT_RUID) failed");
e.a_type = AT_GID;
if ((errno = rk_injectauxv(&e)) != 0)
err(1, "rk_injectauxv(AT_RGID) failed");
/* Inject effective UID and GID */
e.a_un.a_val = eid;
e.a_type = AT_EUID;
if ((errno = rk_injectauxv(&e)) != 0)
err(1, "rk_injectauxv(AT_EUID) failed");
e.a_type = AT_EGID;
if ((errno = rk_injectauxv(&e)) != 0)
err(1, "rk_injectauxv(AT_RGID) failed");
#endif
#ifdef AT_SECURE
e.a_un.a_val = secure;
e.a_type = AT_SECURE;
if ((errno = rk_injectauxv(&e)) != 0)
err(1, "rk_injectauxv(AT_SECURE) failed");
#endif
return;
#else
warnx(1, "No ELF auxv types to inject");
#endif
}
static
unsigned long
getprocauxval(unsigned long type)
@@ -144,5 +187,10 @@ main(int argc, char **argv, char **env)
if (errno != ENOENT)
errx(1, "rk_getauxv((max_type_seen = %lu) + 1) did not set "
"errno = ENOENT!", max_t);
inject_suid(!am_suid);
if ((am_suid && issuid()) || (!am_suid && !issuid()))
errx(1, "rk_injectprocauxv() failed");
return 0;
}