2017-01-29 05:48:03 +01:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
let
|
|
|
|
|
2017-02-14 22:20:27 +01:00
|
|
|
inherit (config.security) wrapperDir wrappers;
|
2017-01-29 08:27:11 +01:00
|
|
|
|
2017-02-18 18:06:09 +01:00
|
|
|
parentWrapperDir = dirOf wrapperDir;
|
|
|
|
|
2017-01-29 08:27:11 +01:00
|
|
|
programs =
|
2017-01-29 08:41:39 +01:00
|
|
|
(lib.mapAttrsToList
|
2019-08-13 23:52:01 +02:00
|
|
|
(n: v: (if v ? program then v else v // {program=n;}))
|
2017-01-29 08:41:39 +01:00
|
|
|
wrappers);
|
2017-01-29 05:48:03 +01:00
|
|
|
|
2017-02-14 01:03:06 +01:00
|
|
|
securityWrapper = pkgs.stdenv.mkDerivation {
|
2017-02-14 15:27:40 +01:00
|
|
|
name = "security-wrapper";
|
|
|
|
phases = [ "installPhase" "fixupPhase" ];
|
|
|
|
buildInputs = [ pkgs.libcap pkgs.libcap_ng pkgs.linuxHeaders ];
|
|
|
|
hardeningEnable = [ "pie" ];
|
2017-02-14 01:03:06 +01:00
|
|
|
installPhase = ''
|
|
|
|
mkdir -p $out/bin
|
2017-12-17 05:05:51 +01:00
|
|
|
$CC -Wall -O2 -DWRAPPER_DIR=\"${parentWrapperDir}\" \
|
2017-02-14 15:27:40 +01:00
|
|
|
-lcap-ng -lcap ${./wrapper.c} -o $out/bin/security-wrapper
|
2017-02-14 01:03:06 +01:00
|
|
|
'';
|
|
|
|
};
|
2017-01-29 05:48:03 +01:00
|
|
|
|
|
|
|
###### Activation script for the setcap wrappers
|
|
|
|
mkSetcapProgram =
|
|
|
|
{ program
|
|
|
|
, capabilities
|
2017-02-14 01:28:13 +01:00
|
|
|
, source
|
2017-01-29 05:48:03 +01:00
|
|
|
, owner ? "nobody"
|
|
|
|
, group ? "nogroup"
|
2017-02-17 15:41:31 +01:00
|
|
|
, permissions ? "u+rx,g+x,o+x"
|
2017-01-29 08:20:02 +01:00
|
|
|
, ...
|
2017-01-30 19:26:56 +01:00
|
|
|
}:
|
2017-01-29 08:07:12 +01:00
|
|
|
assert (lib.versionAtLeast (lib.getVersion config.boot.kernelPackages.kernel) "4.3");
|
2017-02-14 01:03:06 +01:00
|
|
|
''
|
|
|
|
cp ${securityWrapper}/bin/security-wrapper $wrapperDir/${program}
|
2017-02-14 01:28:13 +01:00
|
|
|
echo -n "${source}" > $wrapperDir/${program}.real
|
2017-01-29 05:48:03 +01:00
|
|
|
|
|
|
|
# Prevent races
|
|
|
|
chmod 0000 $wrapperDir/${program}
|
|
|
|
chown ${owner}.${group} $wrapperDir/${program}
|
|
|
|
|
|
|
|
# Set desired capabilities on the file plus cap_setpcap so
|
|
|
|
# the wrapper program can elevate the capabilities set on
|
|
|
|
# its file into the Ambient set.
|
|
|
|
${pkgs.libcap.out}/bin/setcap "cap_setpcap,${capabilities}" $wrapperDir/${program}
|
|
|
|
|
|
|
|
# Set the executable bit
|
2017-02-17 15:41:31 +01:00
|
|
|
chmod ${permissions} $wrapperDir/${program}
|
2017-01-29 05:48:03 +01:00
|
|
|
'';
|
|
|
|
|
|
|
|
###### Activation script for the setuid wrappers
|
|
|
|
mkSetuidProgram =
|
|
|
|
{ program
|
2017-02-14 01:28:13 +01:00
|
|
|
, source
|
2017-01-29 05:48:03 +01:00
|
|
|
, owner ? "nobody"
|
|
|
|
, group ? "nogroup"
|
|
|
|
, setuid ? false
|
|
|
|
, setgid ? false
|
|
|
|
, permissions ? "u+rx,g+x,o+x"
|
2017-01-29 08:20:02 +01:00
|
|
|
, ...
|
2017-01-30 19:26:56 +01:00
|
|
|
}:
|
2017-02-14 01:03:06 +01:00
|
|
|
''
|
|
|
|
cp ${securityWrapper}/bin/security-wrapper $wrapperDir/${program}
|
2017-02-14 01:28:13 +01:00
|
|
|
echo -n "${source}" > $wrapperDir/${program}.real
|
2017-01-29 05:48:03 +01:00
|
|
|
|
|
|
|
# Prevent races
|
|
|
|
chmod 0000 $wrapperDir/${program}
|
|
|
|
chown ${owner}.${group} $wrapperDir/${program}
|
|
|
|
|
|
|
|
chmod "u${if setuid then "+" else "-"}s,g${if setgid then "+" else "-"}s,${permissions}" $wrapperDir/${program}
|
|
|
|
'';
|
2017-01-29 08:27:11 +01:00
|
|
|
|
|
|
|
mkWrappedPrograms =
|
|
|
|
builtins.map
|
2019-08-13 23:52:01 +02:00
|
|
|
(s: if (s ? capabilities)
|
2017-02-14 15:40:12 +01:00
|
|
|
then mkSetcapProgram
|
|
|
|
({ owner = "root";
|
2017-02-14 15:42:08 +01:00
|
|
|
group = "root";
|
2017-02-14 15:40:12 +01:00
|
|
|
} // s)
|
2017-12-17 05:05:51 +01:00
|
|
|
else if
|
2019-08-13 23:52:01 +02:00
|
|
|
(s ? setuid && s.setuid) ||
|
|
|
|
(s ? setgid && s.setgid) ||
|
|
|
|
(s ? permissions)
|
2017-01-29 08:27:11 +01:00
|
|
|
then mkSetuidProgram s
|
2017-01-29 23:47:14 +01:00
|
|
|
else mkSetuidProgram
|
|
|
|
({ owner = "root";
|
|
|
|
group = "root";
|
|
|
|
setuid = true;
|
|
|
|
setgid = false;
|
|
|
|
permissions = "u+rx,g+x,o+x";
|
|
|
|
} // s)
|
2017-01-29 08:27:11 +01:00
|
|
|
) programs;
|
2017-01-29 05:48:03 +01:00
|
|
|
in
|
|
|
|
{
|
2019-12-10 02:51:19 +01:00
|
|
|
imports = [
|
|
|
|
(lib.mkRemovedOptionModule [ "security" "setuidOwners" ] "Use security.wrappers instead")
|
|
|
|
(lib.mkRemovedOptionModule [ "security" "setuidPrograms" ] "Use security.wrappers instead")
|
|
|
|
];
|
2017-01-29 05:48:03 +01:00
|
|
|
|
|
|
|
###### interface
|
|
|
|
|
|
|
|
options = {
|
|
|
|
security.wrappers = lib.mkOption {
|
|
|
|
type = lib.types.attrs;
|
|
|
|
default = {};
|
2017-02-15 09:07:16 +01:00
|
|
|
example = lib.literalExample
|
|
|
|
''
|
|
|
|
{ sendmail.source = "/nix/store/.../bin/sendmail";
|
|
|
|
ping = {
|
|
|
|
source = "${pkgs.iputils.out}/bin/ping";
|
|
|
|
owner = "nobody";
|
|
|
|
group = "nogroup";
|
|
|
|
capabilities = "cap_net_raw+ep";
|
|
|
|
};
|
|
|
|
}
|
|
|
|
'';
|
2017-01-29 05:48:03 +01:00
|
|
|
description = ''
|
2017-02-15 04:30:04 +01:00
|
|
|
This option allows the ownership and permissions on the setuid
|
|
|
|
wrappers for specific programs to be overridden from the
|
|
|
|
default (setuid root, but not setgid root).
|
|
|
|
|
|
|
|
<note>
|
2017-02-15 19:51:12 +01:00
|
|
|
<para>The sub-attribute <literal>source</literal> is mandatory,
|
|
|
|
it must be the absolute path to the program to be wrapped.
|
|
|
|
</para>
|
|
|
|
|
|
|
|
<para>The sub-attribute <literal>program</literal> is optional and
|
|
|
|
can give the wrapper program a new name. The default name is the same
|
|
|
|
as the attribute name itself.</para>
|
|
|
|
|
2017-02-15 04:30:04 +01:00
|
|
|
<para>Additionally, this option can set capabilities on a
|
|
|
|
wrapper program that propagates those capabilities down to the
|
|
|
|
wrapped, real program.</para>
|
|
|
|
|
|
|
|
<para>NOTE: cap_setpcap, which is required for the wrapper
|
|
|
|
program to be able to raise caps into the Ambient set is NOT
|
|
|
|
raised to the Ambient set so that the real program cannot
|
|
|
|
modify its own capabilities!! This may be too restrictive for
|
|
|
|
cases in which the real program needs cap_setpcap but it at
|
|
|
|
least leans on the side security paranoid vs. too
|
|
|
|
relaxed.</para>
|
|
|
|
</note>
|
2017-01-29 05:48:03 +01:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
security.wrapperDir = lib.mkOption {
|
|
|
|
type = lib.types.path;
|
2017-01-29 11:11:01 +01:00
|
|
|
default = "/run/wrappers/bin";
|
2017-01-29 05:48:03 +01:00
|
|
|
internal = true;
|
|
|
|
description = ''
|
|
|
|
This option defines the path to the wrapper programs. It
|
|
|
|
should not be overriden.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
###### implementation
|
|
|
|
config = {
|
2017-01-30 00:10:32 +01:00
|
|
|
|
2017-08-19 18:50:53 +02:00
|
|
|
security.wrappers = {
|
2020-08-14 19:38:11 +02:00
|
|
|
# These are mount related wrappers that require the +s permission.
|
2017-08-19 18:50:53 +02:00
|
|
|
fusermount.source = "${pkgs.fuse}/bin/fusermount";
|
|
|
|
fusermount3.source = "${pkgs.fuse3}/bin/fusermount3";
|
2020-11-24 16:29:28 +01:00
|
|
|
mount.source = "${lib.getBin pkgs.util-linux}/bin/mount";
|
|
|
|
umount.source = "${lib.getBin pkgs.util-linux}/bin/umount";
|
2017-08-19 18:50:53 +02:00
|
|
|
};
|
2017-01-30 00:10:32 +01:00
|
|
|
|
2017-02-18 18:06:09 +01:00
|
|
|
boot.specialFileSystems.${parentWrapperDir} = {
|
|
|
|
fsType = "tmpfs";
|
2020-09-28 19:43:54 +02:00
|
|
|
options = [ "nodev" "mode=755" ];
|
2017-02-18 18:06:09 +01:00
|
|
|
};
|
|
|
|
|
2017-01-29 08:07:12 +01:00
|
|
|
# Make sure our wrapperDir exports to the PATH env variable when
|
|
|
|
# initializing the shell
|
2017-01-29 05:48:03 +01:00
|
|
|
environment.extraInit = ''
|
2017-01-29 08:07:12 +01:00
|
|
|
# Wrappers override other bin directories.
|
2017-01-29 05:48:03 +01:00
|
|
|
export PATH="${wrapperDir}:$PATH"
|
|
|
|
'';
|
|
|
|
|
|
|
|
###### setcap activation script
|
|
|
|
system.activationScripts.wrappers =
|
2017-06-25 21:42:07 +02:00
|
|
|
lib.stringAfter [ "specialfs" "users" ]
|
2017-01-29 05:48:03 +01:00
|
|
|
''
|
|
|
|
# Look in the system path and in the default profile for
|
|
|
|
# programs to be wrapped.
|
|
|
|
WRAPPER_PATH=${config.system.path}/bin:${config.system.path}/sbin
|
|
|
|
|
2020-09-28 19:43:54 +02:00
|
|
|
chmod 755 "${parentWrapperDir}"
|
|
|
|
|
2017-02-18 18:06:09 +01:00
|
|
|
# We want to place the tmpdirs for the wrappers to the parent dir.
|
|
|
|
wrapperDir=$(mktemp --directory --tmpdir="${parentWrapperDir}" wrappers.XXXXXXXXXX)
|
2017-01-29 05:48:03 +01:00
|
|
|
chmod a+rx $wrapperDir
|
|
|
|
|
2017-01-29 08:07:12 +01:00
|
|
|
${lib.concatStringsSep "\n" mkWrappedPrograms}
|
2017-01-29 11:11:01 +01:00
|
|
|
|
|
|
|
if [ -L ${wrapperDir} ]; then
|
|
|
|
# Atomically replace the symlink
|
|
|
|
# See https://axialcorps.com/2013/07/03/atomically-replacing-files-and-directories/
|
2017-01-29 12:05:30 +01:00
|
|
|
old=$(readlink -f ${wrapperDir})
|
2020-09-28 19:43:54 +02:00
|
|
|
if [ -e ${wrapperDir}-tmp ]; then
|
|
|
|
rm --force --recursive ${wrapperDir}-tmp
|
|
|
|
fi
|
2017-01-29 11:11:01 +01:00
|
|
|
ln --symbolic --force --no-dereference $wrapperDir ${wrapperDir}-tmp
|
|
|
|
mv --no-target-directory ${wrapperDir}-tmp ${wrapperDir}
|
|
|
|
rm --force --recursive $old
|
|
|
|
else
|
|
|
|
# For initial setup
|
|
|
|
ln --symbolic $wrapperDir ${wrapperDir}
|
|
|
|
fi
|
2017-01-29 05:48:03 +01:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
}
|