svn commit: r252628 - head/sbin/dhclient
Pawel Jakub Dawidek
pjd at FreeBSD.org
Wed Jul 3 22:16:03 UTC 2013
Author: pjd
Date: Wed Jul 3 22:16:02 2013
New Revision: 252628
URL: http://svnweb.freebsd.org/changeset/base/252628
Log:
MFp4 @229482:
- Limit bpf descriptor in unprivileged process to CAP_POLL_EVENT, CAP_READ and
allow for SIOCGIFFLAGS, SIOCGIFMEDIA ioctls.
- While here limit bpf descriptor in privileged process to only CAP_WRITE.
Reviewed by: brooks
Sponsored by: The FreeBSD Foundation
Modified:
head/sbin/dhclient/bpf.c
Modified: head/sbin/dhclient/bpf.c
==============================================================================
--- head/sbin/dhclient/bpf.c Wed Jul 3 22:14:12 2013 (r252627)
+++ head/sbin/dhclient/bpf.c Wed Jul 3 22:16:02 2013 (r252628)
@@ -45,6 +45,7 @@ __FBSDID("$FreeBSD$");
#include "dhcpd.h"
#include "privsep.h"
+#include <sys/capability.h>
#include <sys/ioctl.h>
#include <sys/uio.h>
@@ -159,6 +160,9 @@ if_register_send(struct interface_info *
if (ioctl(info->wfdesc, BIOCLOCK, NULL) < 0)
error("Cannot lock bpf");
+ if (cap_rights_limit(info->wfdesc, CAP_WRITE) < 0 && errno != ENOSYS)
+ error("Can't limit bpf descriptor: %m");
+
/*
* Use raw socket for unicast send.
*/
@@ -208,6 +212,7 @@ int dhcp_bpf_filter_len = sizeof(dhcp_bp
void
if_register_receive(struct interface_info *info)
{
+ static const unsigned long cmds[2] = { SIOCGIFFLAGS, SIOCGIFMEDIA };
struct bpf_version v;
struct bpf_program p;
int flag = 1, sz;
@@ -258,6 +263,13 @@ if_register_receive(struct interface_inf
if (ioctl(info->rfdesc, BIOCLOCK, NULL) < 0)
error("Cannot lock bpf");
+
+ if (cap_rights_limit(info->rfdesc,
+ CAP_IOCTL | CAP_POLL_EVENT | CAP_READ) < 0 && errno != ENOSYS) {
+ error("Can't limit bpf descriptor: %m");
+ }
+ if (cap_ioctls_limit(info->rfdesc, cmds, 2) < 0 && errno != ENOSYS)
+ error("Can't limit ioctls for bpf descriptor: %m");
}
void
More information about the svn-src-head
mailing list