summaryrefslogtreecommitdiff
path: root/static/netbsd/man9/secmodel_extensions.9
diff options
context:
space:
mode:
Diffstat (limited to 'static/netbsd/man9/secmodel_extensions.9')
-rw-r--r--static/netbsd/man9/secmodel_extensions.9139
1 files changed, 139 insertions, 0 deletions
diff --git a/static/netbsd/man9/secmodel_extensions.9 b/static/netbsd/man9/secmodel_extensions.9
new file mode 100644
index 00000000..c5cc6766
--- /dev/null
+++ b/static/netbsd/man9/secmodel_extensions.9
@@ -0,0 +1,139 @@
+.\" $NetBSD: secmodel_extensions.9,v 1.7 2022/03/27 16:36:11 christos Exp $
+.\"
+.\" Copyright (c) 2011 The NetBSD Foundation, Inc.
+.\" All rights reserved.
+.\"
+.\" This code is derived from software contributed to The NetBSD Foundation
+.\" by Jean-Yves Migeon <jym@NetBSD.org>
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+.\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+.\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+.\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+.\" POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd March 27, 2022
+.Dt SECMODEL_EXTENSIONS 9
+.Os
+.Sh NAME
+.Nm secmodel_extensions
+.Nd extensions security model
+.Sh DESCRIPTION
+.Nm
+implements extensions to the traditional security model based on
+the original
+.Bx 4.4 .
+They can be used to grant additional privileges to ordinary users, or
+enable specific security measures like curtain mode.
+.Pp
+The extensions are described below.
+.Sh Curtain mode
+When enabled, all returned objects will be filtered according to
+the user-id requesting information about them, preventing users from
+accessing objects they do not own.
+.Pp
+It affects the output of many commands, including
+.Xr fstat 1 ,
+.Xr netstat 1 ,
+.Xr ps 1 ,
+.Xr sockstat 1 ,
+and
+.Xr w 1 .
+.Pp
+This extension is enabled by setting
+.Pa security.models.extensions.curtain
+or
+.Pa security.curtain
+.Xr sysctl 7
+to a non-zero value.
+.Pp
+It can be enabled at any time, but cannot be disabled
+anymore when the
+.Em securelevel
+of the system is above 0.
+.Sh Non-superuser mounts
+When enabled, it allows file-systems to be mounted by an ordinary user
+who owns the point
+.Ar node
+and has at least read access to the
+.Ar special
+device
+.Xr mount 8
+arguments.
+Note that the
+.Cm nosuid
+and
+.Cm nodev
+flags must be given for non-superuser mounts.
+.Pp
+This extension is enabled by setting
+.Pa security.models.extensions.usermount
+or
+.Pa vfs.generic.usermount
+.Xr sysctl 7
+to a non-zero value.
+.Pp
+It can be disabled at any time, but cannot be enabled
+anymore when the
+.Em securelevel
+of the system is above 0.
+.Sh Non-superuser control of CPU sets
+When enabled, an ordinary user is allowed to control the CPU
+.Xr affinity 3
+of the processes and threads they own.
+.Pp
+This extension is enabled by setting
+.Pa security.models.extensions.user_set_cpu_affinity
+.Xr sysctl 7
+to a non-zero value.
+.Pp
+It can be disabled at any time, but cannot be enabled
+anymore when the
+.Em securelevel
+of the system is above 0.
+.Sh Hardlink restrictions
+Prevent hardlinks to files that the user does not own or has group access
+to.
+.Pp
+To enable user ownership checks, set the
+.Xr sysctl 7
+variable
+.Pa security.models.extensions.hardlink_check_uid
+to a non-zero value.
+.Pp
+To enable group membership checks, set the
+.Xr sysctl 7
+variable
+.Pa security.models.extensions.hardlink_check_gid
+to a non-zero value.
+.Pp
+These variables can be enabled anytime, but cannot be disabled
+anymore when the
+.Em securelevel
+of the system is above 0.
+.Sh SEE ALSO
+.Xr affinity 3 ,
+.Xr sched 3 ,
+.Xr sysctl 7 ,
+.Xr kauth 9 ,
+.Xr secmodel 9 ,
+.Xr secmodel_bsd44 9 ,
+.Xr secmodel_securelevel 9 ,
+.Xr secmodel_suser 9
+.Sh AUTHORS
+.An Elad Efrat Aq Mt elad@NetBSD.org