patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
214 lines
5.7 KiB
Diff
214 lines
5.7 KiB
Diff
Index: etc/rc.d/jail
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/etc/rc.d/jail,v
|
|
retrieving revision 1.23.2.2
|
|
diff -u -d -r1.23.2.2 jail
|
|
--- etc/rc.d/jail 16 Aug 2005 08:43:06 -0000 1.23.2.2
|
|
+++ etc/rc.d/jail 9 Jan 2007 21:45:16 -0000
|
|
@@ -66,6 +66,8 @@
|
|
[ -z "${jail_fstab}" ] && jail_fstab="/etc/fstab.${_j}"
|
|
eval jail_flags=\"\$jail_${_j}_flags\"
|
|
[ -z "${jail_flags}" ] && jail_flags="-l -U root"
|
|
+ eval _consolelog=\"\${jail_${_j}_consolelog:-${jail_consolelog}}\"
|
|
+ [ -z "${_consolelog}" ] && _consolelog="/var/log/jail_${_j}_console.log"
|
|
|
|
# Debugging aid
|
|
#
|
|
@@ -84,6 +86,7 @@
|
|
debug "$_j exec start: $jail_exec_start"
|
|
debug "$_j exec stop: $jail_exec_stop"
|
|
debug "$_j flags: $jail_flags"
|
|
+ debug "$_j consolelog: $_consolelog"
|
|
}
|
|
|
|
# set_sysctl rc_knob mib msg
|
|
@@ -113,6 +116,56 @@
|
|
fi
|
|
}
|
|
|
|
+# is_current_mountpoint()
|
|
+# Is the directory mount point for a currently mounted file
|
|
+# system?
|
|
+#
|
|
+is_current_mountpoint()
|
|
+{
|
|
+ local _dir _dir2
|
|
+
|
|
+ _dir=$1
|
|
+
|
|
+ _dir=`echo $_dir | sed -Ee 's#//+#/#g' -e 's#/$##'`
|
|
+ [ ! -d "${_dir}" ] && return 1
|
|
+ _dir2=`df ${_dir} | tail +2 | awk '{ print $6 }'`
|
|
+ [ "${_dir}" = "${_dir2}" ]
|
|
+ return $?
|
|
+}
|
|
+
|
|
+# is_symlinked_mountpoint()
|
|
+# Is a mount point, or any of its parent directories, a symlink?
|
|
+#
|
|
+is_symlinked_mountpoint()
|
|
+{
|
|
+ local _dir
|
|
+
|
|
+ _dir=$1
|
|
+
|
|
+ [ -L "$_dir" ] && return 0
|
|
+ [ "$_dir" = "/" ] && return 1
|
|
+ is_symlinked_mountpoint `dirname $_dir`
|
|
+ return $?
|
|
+}
|
|
+
|
|
+# secure_umount
|
|
+# Try to unmount a mount point without being vulnerable to
|
|
+# symlink attacks.
|
|
+#
|
|
+secure_umount()
|
|
+{
|
|
+ local _dir
|
|
+
|
|
+ _dir=$1
|
|
+
|
|
+ if is_current_mountpoint ${_dir}; then
|
|
+ umount -f ${_dir} >/dev/null 2>&1
|
|
+ else
|
|
+ debug "Nothing mounted on ${_dir} - not unmounting"
|
|
+ fi
|
|
+}
|
|
+
|
|
+
|
|
# jail_umount_fs
|
|
# This function unmounts certain special filesystems in the
|
|
# currently selected jail. The caller must call the init_variables()
|
|
@@ -120,27 +173,65 @@
|
|
#
|
|
jail_umount_fs()
|
|
{
|
|
+ local _device _mountpt _rest
|
|
+
|
|
if checkyesno jail_fdescfs; then
|
|
if [ -d "${jail_fdescdir}" ] ; then
|
|
- umount -f ${jail_fdescdir} >/dev/null 2>&1
|
|
+ secure_umount ${jail_fdescdir}
|
|
fi
|
|
fi
|
|
if checkyesno jail_devfs; then
|
|
if [ -d "${jail_devdir}" ] ; then
|
|
- umount -f ${jail_devdir} >/dev/null 2>&1
|
|
+ secure_umount ${jail_devdir}
|
|
fi
|
|
fi
|
|
if checkyesno jail_procfs; then
|
|
if [ -d "${jail_procdir}" ] ; then
|
|
- umount -f ${jail_procdir} >/dev/null 2>&1
|
|
+ secure_umount ${jail_procdir}
|
|
fi
|
|
fi
|
|
if checkyesno jail_mount; then
|
|
[ -f "${jail_fstab}" ] || warn "${jail_fstab} does not exist"
|
|
- umount -a -F "${jail_fstab}" >/dev/null 2>&1
|
|
+ tail -r ${jail_fstab} | while read _device _mountpt _rest; do
|
|
+ case ":${_device}" in
|
|
+ :#* | :)
|
|
+ continue
|
|
+ ;;
|
|
+ esac
|
|
+ secure_umount ${_mountpt}
|
|
+ done
|
|
fi
|
|
}
|
|
|
|
+# jail_mount_fstab()
|
|
+# Mount file systems from a per jail fstab while trying to
|
|
+# secure against symlink attacks at the mount points.
|
|
+#
|
|
+# If we are certain we cannot secure against symlink attacks we
|
|
+# do not mount all of the file systems (since we cannot just not
|
|
+# mount the file system with the problematic mount point).
|
|
+#
|
|
+# The caller must call the init_variables() routine before
|
|
+# calling this one.
|
|
+#
|
|
+jail_mount_fstab()
|
|
+{
|
|
+ local _device _mountpt _rest
|
|
+
|
|
+ while read _device _mountpt _rest; do
|
|
+ case ":${_device}" in
|
|
+ :#* | :)
|
|
+ continue
|
|
+ ;;
|
|
+ esac
|
|
+ if is_symlinked_mountpoint ${_mountpt}; then
|
|
+ warn "${_mountpt} has symlink as parent - not mounting from ${jail_fstab}"
|
|
+ return
|
|
+ fi
|
|
+ done <${_fstab}
|
|
+ mount -a -F "${jail_fstab}"
|
|
+}
|
|
+
|
|
jail_start()
|
|
{
|
|
echo -n 'Configuring jails:'
|
|
@@ -167,12 +258,16 @@
|
|
if [ ! -f "${jail_fstab}" ]; then
|
|
err 3 "$name: ${jail_fstab} does not exist"
|
|
fi
|
|
- mount -a -F "${jail_fstab}"
|
|
+ jail_mount_fstab
|
|
fi
|
|
if checkyesno jail_devfs; then
|
|
# If devfs is already mounted here, skip it.
|
|
df -t devfs "${jail_devdir}" >/dev/null
|
|
if [ $? -ne 0 ]; then
|
|
+ if is_symlinked_mountpoint ${jail_devdir}; then
|
|
+ warn "${jail_devdir} has symlink as parent - not starting jail ${_jail}"
|
|
+ continue
|
|
+ fi
|
|
info "Mounting devfs on ${jail_devdir}"
|
|
devfs_mount_jail "${jail_devdir}" ${jail_ruleset}
|
|
# Transitional symlink for old binaries
|
|
@@ -193,13 +288,21 @@
|
|
# cd "$__pwd"
|
|
fi
|
|
if checkyesno jail_fdescfs; then
|
|
- info "Mounting fdescfs on ${jail_fdescdir}"
|
|
- mount -t fdescfs fdesc "${jail_fdescdir}"
|
|
+ if is_symlinked_mountpoint ${jail_fdescdir}; then
|
|
+ warn "${jail_fdescdir} has symlink as parent, not mounting"
|
|
+ else
|
|
+ info "Mounting fdescfs on ${jail_fdescdir}"
|
|
+ mount -t fdescfs fdesc "${jail_fdescdir}"
|
|
+ fi
|
|
fi
|
|
if checkyesno jail_procfs; then
|
|
- info "Mounting procfs onto ${jail_procdir}"
|
|
- if [ -d "${jail_procdir}" ] ; then
|
|
- mount -t procfs proc "${jail_procdir}"
|
|
+ if is_symlinked_mountpoint ${jail_procdir}; then
|
|
+ warn "${jail_procdir} has symlink as parent, not mounting"
|
|
+ else
|
|
+ info "Mounting procfs onto ${jail_procdir}"
|
|
+ if [ -d "${jail_procdir}" ] ; then
|
|
+ mount -t procfs proc "${jail_procdir}"
|
|
+ fi
|
|
fi
|
|
fi
|
|
_tmp_jail=${_tmp_dir}/jail.$$
|
|
@@ -207,7 +310,7 @@
|
|
${jail_ip} ${jail_exec_start} > ${_tmp_jail} 2>&1
|
|
[ "$?" -eq 0 ] && echo -n " $jail_hostname"
|
|
_jail_id=$(head -1 ${_tmp_jail})
|
|
- tail +2 ${_tmp_jail} >${jail_rootdir}/var/log/console.log
|
|
+ tail +2 ${_tmp_jail} >${_consolelog}
|
|
rm -f ${_tmp_jail}
|
|
echo ${_jail_id} > /var/run/jail_${_jail}.id
|
|
done
|
|
@@ -226,7 +329,7 @@
|
|
init_variables $_jail
|
|
if [ -n "${jail_exec_stop}" ]; then
|
|
eval env -i /usr/sbin/jexec ${_jail_id} ${jail_exec_stop} \
|
|
- >> ${jail_rootdir}/var/log/console.log 2>&1
|
|
+ >> ${_consolelog} 2>&1
|
|
fi
|
|
killall -j ${_jail_id} -TERM > /dev/null 2>&1
|
|
sleep 1
|