aboutsummaryrefslogtreecommitdiff
path: root/security/keyring.go
diff options
context:
space:
mode:
authorJoe Richey joerichey@google.com <joerichey@google.com>2018-08-22 05:23:00 -0700
committerJoe Richey joerichey@google.com <joerichey@google.com>2018-08-23 11:00:34 -0700
commit315f9b042237200174a1fb99427f74027e191d66 (patch)
tree8451aa6f72e232ce1ebdb7d79e393f4de26cc0a6 /security/keyring.go
parent3022c1603d968c22f147b4a2c49c4637dd1be91b (diff)
Ensure keyring privilege changes are reversible
This change makes sure that, when we set the ruid and euid in order to get the user keyring linked into the current process keyring, we will always be able to reverse these changes (using a suid of 0). This fixes an issue where "su <user>" would result in a system error when called by an unprivileged user. It also explains exactly how and why we are making these privilege changes.
Diffstat (limited to 'security/keyring.go')
-rw-r--r--security/keyring.go60
1 files changed, 32 insertions, 28 deletions
diff --git a/security/keyring.go b/security/keyring.go
index ab65631..c4603bc 100644
--- a/security/keyring.go
+++ b/security/keyring.go
@@ -22,7 +22,6 @@ package security
import (
"fmt"
"log"
- "os"
"os/user"
"sync"
@@ -138,42 +137,47 @@ func UserKeyringID(target *user.User, checkSession bool) (int, error) {
return targetKeyring, nil
}
-func userKeyringIDLookup(uid int) (int, error) {
+func userKeyringIDLookup(uid int) (keyringID int, err error) {
cacheLock.Lock()
defer cacheLock.Unlock()
- if keyringID, ok := keyringIDCache[uid]; ok {
- return keyringID, nil
- }
-
- ruid, euid := os.Getuid(), os.Geteuid()
- // If all the ids do not agree, we will have to change them
- needSetUids := uid != ruid || uid != euid
-
- // The value of KEY_SPEC_USER_KEYRING is determined by the real uid, so
- // we must set the ruid appropriately. Note that this will also trigger
- // the creation of the uid keyring if it does not yet exist.
- if needSetUids {
- defer setUids(ruid, euid) // Always reset privileges
- if err := setUids(uid, 0); err != nil {
- return 0, err
+ var ok bool
+ if keyringID, ok = keyringIDCache[uid]; ok {
+ return
+ }
+
+ // Our goals here are to:
+ // - Find the user keyring (for the provided uid)
+ // - Link it into the current process keyring (so we can use it)
+ // - Make no permenant changes to the process privileges
+ // Complicating this are the facts that:
+ // - The value of KEY_SPEC_USER_KEYRING is determined by the ruid
+ // - Keyring linking permissions use the euid
+ // So we have to change both the ruid and euid to make this work,
+ // setting the suid to 0 so that we can later switch back.
+ ruid, euid, suid := getUids()
+ if ruid != uid || euid != uid {
+ if err = setUids(uid, uid, 0); err != nil {
+ return
}
+ defer func() {
+ resetErr := setUids(ruid, euid, suid)
+ if resetErr != nil {
+ err = resetErr
+ }
+ }()
}
- keyringID, err := unix.KeyctlGetKeyringID(unix.KEY_SPEC_USER_KEYRING, true)
+
+ // We get the value of KEY_SPEC_USER_KEYRING. Note that this will also
+ // trigger the creation of the uid keyring if it does not yet exist.
+ keyringID, err = unix.KeyctlGetKeyringID(unix.KEY_SPEC_USER_KEYRING, true)
log.Printf("keyringID(_uid.%d) = %d, %v", uid, keyringID, err)
if err != nil {
return 0, err
}
- // We still want to use this key after our privileges are reset. If we
- // link the key into the process keyring, we will possess it and still
- // be able to use it. However, the permissions to link are based on the
- // effective uid, so we must set the euid appropriately.
- if needSetUids {
- if err := setUids(0, uid); err != nil {
- return 0, err
- }
- }
- if err := keyringLink(keyringID, unix.KEY_SPEC_PROCESS_KEYRING); err != nil {
+ // We still want to use this keyring after our privileges are reset. So
+ // we link it into the process keyring, preventing a loss of access.
+ if err = keyringLink(keyringID, unix.KEY_SPEC_PROCESS_KEYRING); err != nil {
return 0, err
}