1. 10 Jun, 2020 13 commits
  2. 09 Jun, 2020 12 commits
  3. 05 Jun, 2020 4 commits
  4. 04 Jun, 2020 2 commits
  5. 03 Jun, 2020 3 commits
  6. 02 Jun, 2020 6 commits
    • Nils Goroll's avatar
      names, names, names · 512e3953
      Nils Goroll authored
      512e3953
    • Nils Goroll's avatar
      changelog solaris jail · f061c895
      Nils Goroll authored
      f061c895
    • Nils Goroll's avatar
    • Nils Goroll's avatar
      post-push posh polish · 72a92760
      Nils Goroll authored
      72a92760
    • Nils Goroll's avatar
      add JAIL_MASTER_SYSTEM for system() calls from master · 900e9f39
      Nils Goroll authored
      Also (re)used to make fork privileges available when we start a
      subprocess: As we are going to apply the JAIL_SUBPROC privileges to the
      forked process, having slightly eleveated privileges only agross the
      fork() should not cause any harm.
      
      	-
      
      This concludes the current series of Solaris jail patches, hopefully.
      With this commit, varnishd started with pfexec ("root privileges") keeps
      the following privileges only (ppriv -v output) on Solaris:
      
      * master::
      
        flags = PRIV_AWARE
              E: file_read,file_write,net_access
              I: none
              P: file_read,file_write,net_access,net_privaddr,proc_exec,proc_fork,proc_info,proc_owner,proc_setid
              L: file_read,file_write,net_access,net_privaddr,proc_exec,proc_fork,proc_info,proc_owner,proc_setid
      
        notes:
      
        E: file_read is required for basic config files like /etc/netconfig
           net_access is required for CLI communication
      
           file_write could potentially be removed if any file write
           operations (e.g. writing vcl files) were wrapped with
           JAIL_MASTER_FILE, but I do not consider this a relevant gain for
           now.
      
           For other master jail states, E will be momentarily expanded.
      
        I: will be momentarily expanded for system()
      
        P: Contains the union of all privileges used anywhere in varnish
      
        L: Could potentially be reduced further, but P already limits
      
      * worker::
      
        flags = PRIV_AWARE
              E: file_read,file_write,net_access
              I: none
              P: file_read,file_write,net_access,proc_info
              L: file_read,file_write,net_access,proc_info,proc_setid
      
        proc_setid is only used when the worker starts and then dropped
      
        proc_info is only used by vmod_unix
      900e9f39
    • Nils Goroll's avatar
      Solaris jail: manage INHERITABLE for JAIL_MASTER · d50da830
      Nils Goroll authored
      we now dynamically manage the INHERITABLE set also, which has the
      advantage of reducing the privileges available to anything we exec()
      (likely via system()) from master which is not managed through
      JAIL_SUBPROC.
      
      See next commit.
      d50da830