summaryrefslogtreecommitdiffstats
path: root/share/man/man9/suser.9
Commit message (Collapse)AuthorAgeFilesLines
* Remove the suser(9) interface from the kernel. It has been replaced fromattilio2008-09-171-115/+0
| | | | | | | | | | | | | | | | | years by the priv_check(9) interface and just very few places are left. Note that compatibility stub with older FreeBSD version (all above the 8 limit though) are left in order to reduce diffs against old versions. It is responsibility of the maintainers for any module, if they think it is the case, to axe out such cases. This patch breaks KPI so __FreeBSD_version will be bumped into a later commit. This patch needs to be credited 50-50 with rwatson@ as he found time to explain me how the priv_check() works in detail and to review patches. Tested by: Giovanni Trematerra <giovanni dot trematerra at gmail dot com> Reviewed by: rwatson
* - Fix include path, these functions were moved to sys/priv.h.danger2007-08-301-3/+2
| | | | | | Approved by: re (bmah) Submitted by: sbahra@hpcl.seas.gwu.edu (via #bsddocs@EFnet) Pointy hat to: rwatson
* Update suser(9) and priv(9) to document that the 'flags' argument is nowrwatson2007-06-261-30/+10
| | | | | | unused -- SUSER_RUID and SUSER_ALLOWJAIL are no longer defined or used. Approved by: re (bmah)
* Julian says that he doesn't need the advertising clause, so out it goes.imp2007-01-091-5/+1
|
* Bump document date.ru2006-11-061-1/+1
|
* Add a new priv(9) kernel interface for checking the availability ofrwatson2006-11-061-1/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | privilege for threads and credentials. Unlike the existing suser(9) interface, priv(9) exposes a named privilege identifier to the privilege checking code, allowing more complex policies regarding the granting of privilege to be expressed. Two interfaces are provided, replacing the existing suser(9) interface: suser(td) -> priv_check(td, priv) suser_cred(cred, flags) -> priv_check_cred(cred, priv, flags) A comprehensive list of currently available kernel privileges may be found in priv.h. New privileges are easily added as required, but the comments on adding privileges found in priv.h and priv(9) should be read before doing so. The new privilege interface exposed sufficient information to the privilege checking routine that it will now be possible for jail to determine whether a particular privilege is granted in the check routine, rather than relying on hints from the calling context via the SUSER_ALLOWJAIL flag. For now, the flag is maintained, but a new jail check function, prison_priv_check(), is exposed from kern_jail.c and used by the privilege check routine to determine if the privilege is permitted in jail. As a result, a centralized list of privileges permitted in jail is now present in kern_jail.c. The MAC Framework is now also able to instrument privilege checks, both to deny privileges otherwise granted (mac_priv_check()), and to grant privileges otherwise denied (mac_priv_grant()), permitting MAC Policy modules to implement privilege models, as well as control a much broader range of system behavior in order to constrain processes running with root privilege. The suser() and suser_cred() functions remain implemented, now in terms of priv_check() and the PRIV_ROOT privilege, for use during the transition and possibly continuing use by third party kernel modules that have not been updated. The PRIV_DRIVER privilege exists to allow device drivers to check privilege without adopting a more specific privilege identifier. This change does not modify the actual security policy, rather, it modifies the interface for privilege checks so changes to the security policy become more feasible. Sponsored by: nCircle Network Security, Inc. Obtained from: TrustedBSD Project Discussed on: arch@ Reviewed (at least in part) by: mlaier, jmg, pjd, bde, ceri, Alex Lyashkov <umka at sevcity dot net>, Skip Ford <skip dot ford at verizon dot net>, Antoine Brodin <antoine dot brodin at laposte dot net>
* Consistently use `superuser privileges' instead of its singularkeramida2006-05-161-1/+1
| | | | | | | form here and its plural there. Submitted by: Rostislav Krasny <rosti.bsd@gmail.com> MFC after: 3 days
* Scheduled mdoc(7) sweep.ru2005-01-121-2/+2
|
* Remove trailing spaces.krion2005-01-021-2/+2
| | | | | Reviewed by: brueffer MFC after: 3 days
* mdoc(7) janitor:simon2004-08-211-1/+2
| | | | | | - Fix hard sentence breaks. MFC after: 3 days
* Rename suser_cred()'s PRISON_ROOT flag to SUSER_ALLOWJAIL. This iscperciva2004-07-261-1/+1
| | | | | | | | | | | somewhat clearer, but more importantly allows for a consistent naming scheme for suser_cred flags. The old name is still defined, but will be removed in a few days (unless I hear any complaints...) Discussed with: rwatson, scottl Requested by: jhb
* Document the SUSER_RUID flag.cperciva2004-07-171-2/+14
| | | | Reminded by: pjd
* Add a BUGS entry pointing out that the ASU flag isn't being set. This wascperciva2004-07-171-0/+7
| | | | disabled by rwatson in revision 1.60 of sys/kern/kern_prot.c in August 2000.
* - Overdue bump of the document date.ru2004-04-061-17/+19
| | | | | - Fixed markup. - Minor wordsmithing.
* Mdoc Janitor:hmp2003-10-231-3/+4
| | | | * Fix hard sentence breaks.
* - Update to new suser() API.jhb2002-04-021-11/+11
| | | | | - Spell privilege properly. - Grammar nits.
* Update function definitions and required include files to reflectdavidc2001-12-261-2/+2
| | | | | | the current state of the system. Approved by: alfred
* mdoc(7) police: Use the new .In macro for #include statements.ru2001-10-011-2/+2
|
* Removed whitespace at end-of-line; no content changes. I simply didschweikh2001-07-141-5/+5
| | | | | | | | | | cd src/share; find man[1-9] -type f|xargs perl -pi -e 's/[ \t]+$//' BTW, what editors are the culprits? I'm using vim and it shows me whitespace at EOL in troff files with a thick blue block... Reviewed by: Silence from cvs diff -b MFC after: 7 days
* mdoc(7) police: removed HISTORY info from the .Os call.ru2001-07-101-1/+1
|
* Fixed bitrot in synopsis (some const poisoning had not reached here).bde2001-02-151-2/+2
|
* mdoc(7) police: use canonical form of .Dd macro.ru2000-12-111-1/+1
|
* mdoc(7) police: Er macro usage cleanup.ru2000-11-221-1/+1
|
* Move suser() and suser_xxx() prototypes and a related #define fromphk2000-10-291-2/+1
| | | | | | | | | <sys/proc.h> to <sys/systm.h>. Correctly document the #includes needed in the manpage. Add one now needed #include of <sys/systm.h>. Remove the consequent 48 unused #includes of <sys/proc.h>.
* Clear extraneous arguments to the name (Nm) macro.sheldonh2000-08-171-7/+9
| | | | Mark PRISON_ROOT and EPERM as defined values (Dv).
* Grammar police; make the English style more consistent throughout,markm2000-08-161-13/+17
| | | | and give suser_xxx some more airtime.
* $Id$ -> $FreeBSD$peter1999-08-281-1/+1
|
* Fix some typos and do some minor mdoc cleanup.mpp1999-06-271-2/+2
|
* Fixed bitrot in synopsis (a missing include).bde1999-06-021-1/+2
|
* This Implements the mumbled about "Jail" feature.phk1999-04-281-10/+45
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is a seriously beefed up chroot kind of thing. The process is jailed along the same lines as a chroot does it, but with additional tough restrictions imposed on what the superuser can do. For all I know, it is safe to hand over the root bit inside a prison to the customer living in that prison, this is what it was developed for in fact: "real virtual servers". Each prison has an ip number associated with it, which all IP communications will be coerced to use and each prison has its own hostname. Needless to say, you need more RAM this way, but the advantage is that each customer can run their own particular version of apache and not stomp on the toes of their neighbors. It generally does what one would expect, but setting up a jail still takes a little knowledge. A few notes: I have no scripts for setting up a jail, don't ask me for them. The IP number should be an alias on one of the interfaces. mount a /proc in each jail, it will make ps more useable. /proc/<pid>/status tells the hostname of the prison for jailed processes. Quotas are only sensible if you have a mountpoint per prison. There are no privisions for stopping resource-hogging. Some "#ifdef INET" and similar may be missing (send patches!) If somebody wants to take it from here and develop it into more of a "virtual machine" they should be most welcome! Tools, comments, patches & documentation most welcome. Have fun... Sponsored by: http://www.rndassociates.com/ Run for almost a year by: http://www.servetheweb.com/
* Fixed a missing #include in the synopsis.bde1998-01-161-1/+2
|
* add missing cvs Id linesjmg1997-03-071-0/+2
|
* Minor formatting/style fixes.mpp1996-12-091-3/+0
| | | | Submitted by: Sandro Sigala <sandro@cat.local.net> as part of PR # 2134
* Correct some spelling errors.mpp1996-12-011-1/+1
|
* add a man page for suser() because its usage is not as obviousjulian1996-10-161-0/+69
as you would first think.
OpenPOWER on IntegriCloud