summaryrefslogtreecommitdiff
path: root/src/security_util.cpp
blob: 33728fc741cde94fd4ab7aef90f6ee371c118109 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
//SPDX-License-Identifier: GPL-3.0

#include <libqalculate/Function.h>
#include <libqalculate/Variable.h>
#include <security_util.h>

#ifdef UID
#include <grp.h>
#include <cap-ng.h>
#else
#warning "Not doing setuid/setgid, do not use in production!"
#endif

#ifdef SECCOMP
#include <seccomp.h>
#else
#warning "Not doing seccomp, do not use in production!"
#endif

void do_setuid() {
#ifdef UID
if (setgroups(0, {})) {
	perror("couldn't remove groups");
	abort();
}

if (setresgid(UID, UID, UID)) {
	perror("couldn't set gid");
	abort();
}

if (setresuid(UID, UID, UID)) {
	perror("couldn't set uid");
	abort();
}

capng_clear(CAPNG_SELECT_BOTH);
if (capng_update(CAPNG_DROP, (capng_type_t)(CAPNG_EFFECTIVE | CAPNG_PERMITTED), CAP_SETGID)) {
	printf("couldn't drop caps: can't select\n");
	abort();
}
int err = capng_apply(CAPNG_SELECT_BOTH);
if (err) {
	printf("couldn't drop caps: %d\n", err);
	abort();
}
#endif
}

void do_defang_calculator(Calculator *calc) {
	calc->getActiveFunction("command")->destroy(); // rce
#ifdef HAS_PLOT
	calc->getActiveFunction("plot")->destroy(); // wouldn't work
#endif
	calc->getActiveVariable("uptime")->destroy(); // information leakage
}

void do_seccomp() {
#ifdef SECCOMP
scmp_filter_ctx ctx;
ctx = seccomp_init(SCMP_ACT_KILL);
/*   0 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 0);
/*   1 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(write), 0);
/*   9 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(mmap), 0);
/*  10 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(mprotect), 0);
/*  11 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(munmap), 0);
/*  13 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(rt_sigaction), 0);
/*  14 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(rt_sigprocmask), 0);
/*  24 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(sched_yield), 0);
/* 230 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(clock_nanosleep), 0);
/* 231 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(exit_group), 0);
/* 262 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(newfstatat), 0);
/* 273 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(set_robust_list), 0);
/* 334 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(rseq), 0);
/* 435 */ seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(clone3), 0);
int err = seccomp_load(ctx);
if (err) {
	printf("couldn't seccomp: %d\n", err);
	abort();
}
#endif
}