1. 02 Jun, 2020 12 commits
    • Nils Goroll's avatar
      post-push posh polish · 72a92760
      Nils Goroll authored
      72a92760
    • Nils Goroll's avatar
      add JAIL_MASTER_SYSTEM for system() calls from master · 900e9f39
      Nils Goroll authored
      Also (re)used to make fork privileges available when we start a
      subprocess: As we are going to apply the JAIL_SUBPROC privileges to the
      forked process, having slightly eleveated privileges only agross the
      fork() should not cause any harm.
      
      	-
      
      This concludes the current series of Solaris jail patches, hopefully.
      With this commit, varnishd started with pfexec ("root privileges") keeps
      the following privileges only (ppriv -v output) on Solaris:
      
      * master::
      
        flags = PRIV_AWARE
              E: file_read,file_write,net_access
              I: none
              P: file_read,file_write,net_access,net_privaddr,proc_exec,proc_fork,proc_info,proc_owner,proc_setid
              L: file_read,file_write,net_access,net_privaddr,proc_exec,proc_fork,proc_info,proc_owner,proc_setid
      
        notes:
      
        E: file_read is required for basic config files like /etc/netconfig
           net_access is required for CLI communication
      
           file_write could potentially be removed if any file write
           operations (e.g. writing vcl files) were wrapped with
           JAIL_MASTER_FILE, but I do not consider this a relevant gain for
           now.
      
           For other master jail states, E will be momentarily expanded.
      
        I: will be momentarily expanded for system()
      
        P: Contains the union of all privileges used anywhere in varnish
      
        L: Could potentially be reduced further, but P already limits
      
      * worker::
      
        flags = PRIV_AWARE
              E: file_read,file_write,net_access
              I: none
              P: file_read,file_write,net_access,proc_info
              L: file_read,file_write,net_access,proc_info,proc_setid
      
        proc_setid is only used when the worker starts and then dropped
      
        proc_info is only used by vmod_unix
      900e9f39
    • Nils Goroll's avatar
      Solaris jail: manage INHERITABLE for JAIL_MASTER · d50da830
      Nils Goroll authored
      we now dynamically manage the INHERITABLE set also, which has the
      advantage of reducing the privileges available to anything we exec()
      (likely via system()) from master which is not managed through
      JAIL_SUBPROC.
      
      See next commit.
      d50da830
    • Nils Goroll's avatar
      Solaris jail: wrap setppriv(PRIV_ON, ...) · 7a895f7f
      Nils Goroll authored
      7a895f7f
    • Nils Goroll's avatar
      polish · 883ad98f
      Nils Goroll authored
      883ad98f
    • Nils Goroll's avatar
      Solaris jail: mask available privileges · 6df5b1bb
      Nils Goroll authored
      Avoid setppriv() tolerating EPERM by masking privileges with the
      available upper bound.
      6df5b1bb
    • Nils Goroll's avatar
      fix comment · f77eb3b3
      Nils Goroll authored
      f77eb3b3
    • Dridi Boukelmoune's avatar
      Tolerate GCOV droppings in u0.vtc · 9a14e68e
      Dridi Boukelmoune authored
      9a14e68e
    • Dridi Boukelmoune's avatar
      0786c5cd
    • Nils Goroll's avatar
      Rework the solaris jail code · 19593074
      Nils Goroll authored
      - simplify definition of privileges in a table file
      - only initialize priv sets once
      - implement the master jails
      19593074
    • Nils Goroll's avatar
    • Nils Goroll's avatar
      VJ_make_subdir needs JAIL_MASTER_FILE · f80b1910
      Nils Goroll authored
      f80b1910
  2. 30 May, 2020 2 commits
  3. 29 May, 2020 3 commits
  4. 28 May, 2020 2 commits
  5. 27 May, 2020 2 commits
  6. 26 May, 2020 1 commit
  7. 25 May, 2020 8 commits
  8. 23 May, 2020 3 commits
  9. 21 May, 2020 1 commit
  10. 19 May, 2020 5 commits
  11. 18 May, 2020 1 commit