2021-03-04 11:30:38 +00:00
|
|
|
#define _GNU_SOURCE
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include "sec.h"
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <grp.h>
|
|
|
|
|
|
|
|
#ifdef __linux__
|
|
|
|
|
|
|
|
#include <sys/prctl.h>
|
2022-11-22 14:49:53 +00:00
|
|
|
#include <sys/syscall.h>
|
|
|
|
#include <linux/seccomp.h>
|
|
|
|
#include <linux/filter.h>
|
2022-11-23 09:11:37 +00:00
|
|
|
// __X32_SYSCALL_BIT defined in linux/unistd.h
|
|
|
|
#include <linux/unistd.h>
|
2022-11-22 14:49:53 +00:00
|
|
|
#include <syscall.h>
|
2022-11-23 08:58:06 +00:00
|
|
|
#include <errno.h>
|
2022-11-22 14:49:53 +00:00
|
|
|
|
|
|
|
/************ SECCOMP ************/
|
2022-11-23 08:58:06 +00:00
|
|
|
|
2022-11-22 14:49:53 +00:00
|
|
|
// block most of the undesired syscalls to harden against code execution
|
|
|
|
static long blocked_syscalls[] = {
|
|
|
|
#ifdef SYS_execv
|
|
|
|
SYS_execv,
|
|
|
|
#endif
|
2022-11-23 21:15:07 +00:00
|
|
|
SYS_execve,
|
|
|
|
#ifdef SYS_execveat
|
|
|
|
SYS_execveat,
|
|
|
|
#endif
|
2022-11-22 14:49:53 +00:00
|
|
|
#ifdef SYS_exec_with_loader
|
|
|
|
SYS_exec_with_loader,
|
|
|
|
#endif
|
2022-11-22 15:23:04 +00:00
|
|
|
#ifdef SYS_clone
|
2022-11-22 14:49:53 +00:00
|
|
|
SYS_clone,
|
2022-11-22 15:23:04 +00:00
|
|
|
#endif
|
|
|
|
#ifdef SYS_clone2
|
|
|
|
SYS_clone2,
|
|
|
|
#endif
|
2022-11-22 14:49:53 +00:00
|
|
|
#ifdef SYS_clone3
|
|
|
|
SYS_clone3,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_osf_execve
|
|
|
|
SYS_osf_execve,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_fork
|
|
|
|
SYS_fork,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_vfork
|
|
|
|
SYS_vfork,
|
|
|
|
#endif
|
2022-12-05 11:38:39 +00:00
|
|
|
#ifdef SYS_uselib
|
|
|
|
SYS_uselib,
|
|
|
|
#endif
|
2022-11-22 14:49:53 +00:00
|
|
|
#ifdef SYS_unlink
|
|
|
|
SYS_unlink,
|
|
|
|
#endif
|
|
|
|
SYS_unlinkat,
|
|
|
|
#ifdef SYS_chmod
|
|
|
|
SYS_chmod,
|
|
|
|
#endif
|
|
|
|
SYS_fchmod,SYS_fchmodat,
|
|
|
|
#ifdef SYS_chown
|
|
|
|
SYS_chown,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_chown32
|
|
|
|
SYS_chown32,
|
|
|
|
#endif
|
|
|
|
SYS_fchown,
|
|
|
|
#ifdef SYS_fchown32
|
|
|
|
SYS_fchown32,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_lchown
|
|
|
|
SYS_lchown,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_lchown32
|
|
|
|
SYS_lchown32,
|
|
|
|
#endif
|
|
|
|
SYS_fchownat,
|
|
|
|
#ifdef SYS_symlink
|
|
|
|
SYS_symlink,
|
|
|
|
#endif
|
|
|
|
SYS_symlinkat,
|
|
|
|
#ifdef SYS_link
|
|
|
|
SYS_link,
|
|
|
|
#endif
|
|
|
|
SYS_linkat,
|
2022-11-23 21:15:07 +00:00
|
|
|
#ifdef SYS_pkey_mprotect
|
|
|
|
SYS_pkey_mprotect,
|
|
|
|
#endif
|
|
|
|
SYS_mprotect,
|
2022-11-22 14:49:53 +00:00
|
|
|
SYS_truncate,
|
|
|
|
#ifdef SYS_truncate64
|
|
|
|
SYS_truncate64,
|
|
|
|
#endif
|
|
|
|
SYS_ftruncate,
|
|
|
|
#ifdef SYS_ftruncate64
|
|
|
|
SYS_ftruncate64,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_mknod
|
|
|
|
SYS_mknod,
|
|
|
|
#endif
|
|
|
|
SYS_mknodat,
|
|
|
|
#ifdef SYS_mkdir
|
|
|
|
SYS_mkdir,
|
|
|
|
#endif
|
|
|
|
SYS_mkdirat,
|
|
|
|
#ifdef SYS_rmdir
|
|
|
|
SYS_rmdir,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_rename
|
|
|
|
SYS_rename,
|
|
|
|
#endif
|
2022-11-23 21:15:07 +00:00
|
|
|
#ifdef SYS_renameat2
|
|
|
|
SYS_renameat2,
|
|
|
|
#endif
|
2022-12-05 11:38:39 +00:00
|
|
|
SYS_renameat,
|
2022-12-07 18:00:22 +00:00
|
|
|
#ifdef SYS_readdir
|
|
|
|
SYS_readdir,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_getdents
|
|
|
|
SYS_getdents,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_getdents64
|
|
|
|
SYS_getdents64,
|
|
|
|
#endif
|
2022-12-05 11:38:39 +00:00
|
|
|
#ifdef SYS_process_vm_readv
|
|
|
|
SYS_process_vm_readv,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_process_vm_writev
|
|
|
|
SYS_process_vm_writev,
|
|
|
|
#endif
|
2022-12-05 11:51:36 +00:00
|
|
|
#ifdef SYS_process_madvise
|
2022-12-05 11:38:39 +00:00
|
|
|
SYS_process_madvise,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_tkill
|
|
|
|
SYS_tkill,
|
|
|
|
#endif
|
|
|
|
#ifdef SYS_tgkill
|
|
|
|
SYS_tgkill,
|
|
|
|
#endif
|
|
|
|
SYS_kill, SYS_ptrace
|
2022-11-22 14:49:53 +00:00
|
|
|
};
|
|
|
|
#define BLOCKED_SYSCALL_COUNT (sizeof(blocked_syscalls)/sizeof(*blocked_syscalls))
|
|
|
|
|
|
|
|
static void set_filter(struct sock_filter *filter, __u16 code, __u8 jt, __u8 jf, __u32 k)
|
|
|
|
{
|
|
|
|
filter->code = code;
|
|
|
|
filter->jt = jt;
|
|
|
|
filter->jf = jf;
|
|
|
|
filter->k = k;
|
|
|
|
}
|
|
|
|
// deny all blocked syscalls
|
2023-10-13 17:10:46 +00:00
|
|
|
static bool set_seccomp(void)
|
2022-11-22 14:49:53 +00:00
|
|
|
{
|
2022-11-23 08:58:06 +00:00
|
|
|
#ifdef __X32_SYSCALL_BIT
|
|
|
|
#define SECCOMP_PROG_SIZE (6 + BLOCKED_SYSCALL_COUNT)
|
|
|
|
#else
|
|
|
|
#define SECCOMP_PROG_SIZE (5 + BLOCKED_SYSCALL_COUNT)
|
|
|
|
#endif
|
|
|
|
struct sock_filter sockf[SECCOMP_PROG_SIZE];
|
|
|
|
struct sock_fprog prog = { .len = SECCOMP_PROG_SIZE, .filter = sockf };
|
|
|
|
int i,idx=0;
|
2022-11-22 14:49:53 +00:00
|
|
|
|
|
|
|
set_filter(&prog.filter[idx++], BPF_LD + BPF_W + BPF_ABS, 0, 0, arch_nr);
|
2022-11-23 08:58:06 +00:00
|
|
|
#ifdef __X32_SYSCALL_BIT
|
|
|
|
// x86 only
|
2022-11-22 14:49:53 +00:00
|
|
|
set_filter(&prog.filter[idx++], BPF_JMP + BPF_JEQ + BPF_K, 0, 3 + BLOCKED_SYSCALL_COUNT, ARCH_NR); // fail
|
|
|
|
set_filter(&prog.filter[idx++], BPF_LD + BPF_W + BPF_ABS, 0, 0, syscall_nr);
|
2022-11-23 08:58:06 +00:00
|
|
|
set_filter(&prog.filter[idx++], BPF_JMP + BPF_JGT + BPF_K, 1 + BLOCKED_SYSCALL_COUNT, 0, __X32_SYSCALL_BIT - 1); // fail
|
|
|
|
#else
|
2022-11-23 15:56:10 +00:00
|
|
|
set_filter(&prog.filter[idx++], BPF_JMP + BPF_JEQ + BPF_K, 0, 2 + BLOCKED_SYSCALL_COUNT, ARCH_NR); // fail
|
2022-11-23 08:58:06 +00:00
|
|
|
set_filter(&prog.filter[idx++], BPF_LD + BPF_W + BPF_ABS, 0, 0, syscall_nr);
|
|
|
|
#endif
|
|
|
|
|
2022-11-22 14:49:53 +00:00
|
|
|
/*
|
|
|
|
// ! THIS IS NOT WORKING BECAUSE perror() in glibc dups() stderr
|
|
|
|
set_filter(&prog.filter[idx++], BPF_JMP + BPF_JEQ + BPF_K, 0, 3, SYS_write); // special check for write call
|
|
|
|
set_filter(&prog.filter[idx++], BPF_LD + BPF_W + BPF_ABS, 0, 0, syscall_arg(0)); // fd
|
|
|
|
set_filter(&prog.filter[idx++], BPF_JMP + BPF_JGT + BPF_K, 2 + BLOCKED_SYSCALL_COUNT, 0, 2); // 1 - stdout, 2 - stderr. greater are bad
|
|
|
|
set_filter(&prog.filter[idx++], BPF_LD + BPF_W + BPF_ABS, 0, 0, syscall_nr); // reload syscall_nr
|
|
|
|
*/
|
|
|
|
for(i=0 ; i<BLOCKED_SYSCALL_COUNT ; i++)
|
|
|
|
{
|
|
|
|
set_filter(&prog.filter[idx++], BPF_JMP + BPF_JEQ + BPF_K, BLOCKED_SYSCALL_COUNT-i, 0, blocked_syscalls[i]);
|
|
|
|
}
|
|
|
|
set_filter(&prog.filter[idx++], BPF_RET + BPF_K, 0, 0, SECCOMP_RET_ALLOW); // success case
|
|
|
|
set_filter(&prog.filter[idx++], BPF_RET + BPF_K, 0, 0, SECCOMP_RET_KILL); // fail case
|
2022-11-23 08:58:06 +00:00
|
|
|
return prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog) >= 0;
|
2022-11-22 14:49:53 +00:00
|
|
|
}
|
|
|
|
|
2023-10-13 17:10:46 +00:00
|
|
|
bool sec_harden(void)
|
2022-11-22 14:49:53 +00:00
|
|
|
{
|
|
|
|
if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0))
|
|
|
|
{
|
|
|
|
perror("PR_SET_NO_NEW_PRIVS(prctl)");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
#if ARCH_NR!=0
|
|
|
|
if (!set_seccomp())
|
|
|
|
{
|
|
|
|
perror("seccomp");
|
2022-11-23 08:58:06 +00:00
|
|
|
if (errno==EINVAL) fprintf(stderr,"seccomp: this can be safely ignored if kernel does not support seccomp\n");
|
2022-11-22 14:49:53 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-03-04 11:30:38 +00:00
|
|
|
|
2022-11-23 08:58:06 +00:00
|
|
|
|
2021-03-04 11:30:38 +00:00
|
|
|
bool checkpcap(uint64_t caps)
|
|
|
|
{
|
|
|
|
if (!caps) return true; // no special caps reqd
|
|
|
|
|
|
|
|
struct __user_cap_header_struct ch = {_LINUX_CAPABILITY_VERSION_3, getpid()};
|
|
|
|
struct __user_cap_data_struct cd[2];
|
|
|
|
uint32_t c0 = (uint32_t)caps;
|
|
|
|
uint32_t c1 = (uint32_t)(caps>>32);
|
|
|
|
|
|
|
|
return !capget(&ch,cd) && (cd[0].effective & c0)==c0 && (cd[1].effective & c1)==c1;
|
|
|
|
}
|
|
|
|
bool setpcap(uint64_t caps)
|
|
|
|
{
|
|
|
|
struct __user_cap_header_struct ch = {_LINUX_CAPABILITY_VERSION_3, getpid()};
|
|
|
|
struct __user_cap_data_struct cd[2];
|
|
|
|
|
|
|
|
cd[0].effective = cd[0].permitted = (uint32_t)caps;
|
|
|
|
cd[0].inheritable = 0;
|
|
|
|
cd[1].effective = cd[1].permitted = (uint32_t)(caps>>32);
|
|
|
|
cd[1].inheritable = 0;
|
|
|
|
|
|
|
|
return !capset(&ch,cd);
|
|
|
|
}
|
2023-10-13 17:10:46 +00:00
|
|
|
int getmaxcap(void)
|
2021-03-04 11:30:38 +00:00
|
|
|
{
|
|
|
|
int maxcap = CAP_LAST_CAP;
|
|
|
|
FILE *F = fopen("/proc/sys/kernel/cap_last_cap", "r");
|
|
|
|
if (F)
|
|
|
|
{
|
2021-12-03 20:01:49 +00:00
|
|
|
int n = fscanf(F, "%d", &maxcap);
|
2021-03-04 11:30:38 +00:00
|
|
|
fclose(F);
|
|
|
|
}
|
|
|
|
return maxcap;
|
|
|
|
|
|
|
|
}
|
2023-10-13 17:10:46 +00:00
|
|
|
bool dropcaps(void)
|
2021-03-04 11:30:38 +00:00
|
|
|
{
|
|
|
|
uint64_t caps = 0;
|
|
|
|
int maxcap = getmaxcap();
|
|
|
|
|
|
|
|
if (setpcap(caps|(1<<CAP_SETPCAP)))
|
|
|
|
{
|
|
|
|
for (int cap = 0; cap <= maxcap; cap++)
|
|
|
|
{
|
|
|
|
if (prctl(PR_CAPBSET_DROP, cap)<0)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "could not drop bound cap %d\n", cap);
|
|
|
|
perror("cap_drop_bound");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// now without CAP_SETPCAP
|
|
|
|
if (!setpcap(caps))
|
|
|
|
{
|
|
|
|
perror("setpcap");
|
|
|
|
return checkpcap(caps);
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
2022-11-22 14:49:53 +00:00
|
|
|
#else // __linux__
|
|
|
|
|
2023-10-13 17:10:46 +00:00
|
|
|
bool sec_harden(void)
|
2022-11-22 14:49:53 +00:00
|
|
|
{
|
|
|
|
// noop
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif // __linux__
|
|
|
|
|
|
|
|
|
2021-03-04 11:30:38 +00:00
|
|
|
|
2023-10-13 17:10:46 +00:00
|
|
|
bool can_drop_root(void)
|
2021-03-04 11:30:38 +00:00
|
|
|
{
|
|
|
|
#ifdef __linux__
|
|
|
|
// has some caps
|
|
|
|
return checkpcap((1<<CAP_SETUID)|(1<<CAP_SETGID)|(1<<CAP_SETPCAP));
|
|
|
|
#else
|
|
|
|
// effective root
|
|
|
|
return !geteuid();
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
bool droproot(uid_t uid, gid_t gid)
|
|
|
|
{
|
|
|
|
#ifdef __linux__
|
|
|
|
if (prctl(PR_SET_KEEPCAPS, 1L))
|
|
|
|
{
|
2021-03-05 18:02:34 +00:00
|
|
|
perror("prctl(PR_SET_KEEPCAPS)");
|
2021-03-04 11:30:38 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
// drop all SGIDs
|
|
|
|
if (setgroups(0,NULL))
|
|
|
|
{
|
2021-03-05 18:02:34 +00:00
|
|
|
perror("setgroups");
|
2021-03-04 11:30:38 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (setgid(gid))
|
|
|
|
{
|
2021-03-05 18:02:34 +00:00
|
|
|
perror("setgid");
|
2021-03-04 11:30:38 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (setuid(uid))
|
|
|
|
{
|
2021-03-05 18:02:34 +00:00
|
|
|
perror("setuid");
|
2021-03-04 11:30:38 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
#ifdef __linux__
|
|
|
|
return dropcaps();
|
|
|
|
#else
|
|
|
|
return true;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2023-10-13 17:10:46 +00:00
|
|
|
void print_id(void)
|
2021-03-04 11:30:38 +00:00
|
|
|
{
|
|
|
|
int i,N;
|
|
|
|
gid_t g[128];
|
|
|
|
printf("Running as UID=%u GID=",getuid());
|
|
|
|
N=getgroups(sizeof(g)/sizeof(*g),g);
|
|
|
|
if (N>0)
|
|
|
|
{
|
|
|
|
for(i=0;i<N;i++)
|
|
|
|
printf(i==(N-1) ? "%u" : "%u,", g[i]);
|
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
printf("%u\n",getgid());
|
|
|
|
}
|
|
|
|
|
2023-10-13 17:10:46 +00:00
|
|
|
void daemonize(void)
|
2021-03-04 11:30:38 +00:00
|
|
|
{
|
|
|
|
int pid;
|
|
|
|
|
|
|
|
pid = fork();
|
|
|
|
if (pid == -1)
|
|
|
|
{
|
2021-03-05 18:02:34 +00:00
|
|
|
perror("fork");
|
2021-03-04 11:30:38 +00:00
|
|
|
exit(2);
|
|
|
|
}
|
|
|
|
else if (pid != 0)
|
|
|
|
exit(0);
|
|
|
|
|
|
|
|
if (setsid() == -1)
|
|
|
|
exit(2);
|
|
|
|
if (chdir("/") == -1)
|
|
|
|
exit(2);
|
|
|
|
close(STDIN_FILENO);
|
|
|
|
close(STDOUT_FILENO);
|
|
|
|
close(STDERR_FILENO);
|
|
|
|
/* redirect fd's 0,1,2 to /dev/null */
|
|
|
|
open("/dev/null", O_RDWR);
|
|
|
|
int fd;
|
|
|
|
/* stdin */
|
|
|
|
fd = dup(0);
|
|
|
|
/* stdout */
|
|
|
|
fd = dup(0);
|
|
|
|
/* stderror */
|
|
|
|
}
|
|
|
|
|
|
|
|
bool writepid(const char *filename)
|
|
|
|
{
|
|
|
|
FILE *F;
|
|
|
|
if (!(F = fopen(filename, "w")))
|
|
|
|
return false;
|
|
|
|
fprintf(F, "%d", getpid());
|
|
|
|
fclose(F);
|
|
|
|
return true;
|
|
|
|
}
|