Print this page
11621 fmadm and fmstat document privileges incorrectly

Split Close
Expand all
Collapse all
          --- old/usr/src/man/man5/privileges.5.man.txt
          +++ new/usr/src/man/man5/privileges.5.man.txt
   1    1  PRIVILEGES(5)         Standards, Environments, and Macros        PRIVILEGES(5)
   2    2  
   3    3  
   4    4  
   5    5  NAME
   6    6         privileges - process privilege model
   7    7  
   8    8  DESCRIPTION
   9      -       Solaris software implements a set of privileges that provide fine-
        9 +       In illumos, software implements a set of privileges that provide fine-
  10   10         grained control over the actions of processes. The possession of a
  11   11         certain privilege allows a process to perform a specific set of
  12   12         restricted operations.
  13   13  
  14   14  
  15      -       The change to a primarily privilege-based security model in the Solaris
       15 +       The change to a primarily privilege-based security model in the
  16   16         operating system gives developers an opportunity to restrict processes
  17   17         to those privileged operations actually needed instead of all (super-
  18   18         user) or no privileges (non-zero UIDs). Additionally, a set of
  19   19         previously unrestricted operations now requires a privilege; these
  20   20         privileges are dubbed the "basic" privileges and are by default given
  21   21         to all processes.
  22   22  
  23   23  
  24   24         Taken together, all defined privileges with the exception of the
  25   25         "basic" privileges compose the set of privileges that are traditionally
↓ open down ↓ 368 lines elided ↑ open up ↑
 394  394  
 395  395         PRIV_SYS_ACCT
 396  396  
 397  397             Allow a process to enable and disable and manage accounting through
 398  398             acct(2).
 399  399  
 400  400  
 401  401         PRIV_SYS_ADMIN
 402  402  
 403  403             Allow a process to perform system administration tasks such as
 404      -           setting node and domain name and specifying coreadm(1M) and
 405      -           nscd(1M) settings
      404 +           setting node and domain name and managing fmd(1M) and nscd(1M).
 406  405  
 407  406  
 408  407         PRIV_SYS_AUDIT
 409  408  
 410  409             Allow a process to start the (kernel) audit daemon. Allow a process
 411  410             to view and set audit state (audit user ID, audit terminal ID,
 412  411             audit sessions ID, audit pre-selection mask). Allow a process to
 413  412             turn off and on auditing. Allow a process to configure the audit
 414  413             parameters (cache and queue sizes, event to class mappings, and
 415  414             policy options).
↓ open down ↓ 102 lines elided ↑ open up ↑
 518  517             Allow a process to provide NetBIOS or SMB services: start SMB
 519  518             kernel threads or bind to NetBIOS or SMB reserved ports: ports 137,
 520  519             138, 139 (NetBIOS) and 445 (SMB).
 521  520  
 522  521  
 523  522         PRIV_SYS_SUSER_COMPAT
 524  523  
 525  524             Allow a process to successfully call a third party loadable module
 526  525             that calls the kernel suser() function to check for allowed access.
 527  526             This privilege exists only for third party loadable module
 528      -           compatibility and is not used by Solaris proper.
      527 +           compatibility and is not used by illumos.
 529  528  
 530  529  
 531  530         PRIV_SYS_TIME
 532  531  
 533  532             Allow a process to manipulate system time using any of the
 534  533             appropriate system calls: stime(2), adjtime(2), and ntp_adjtime(2).
 535  534  
 536  535  
 537  536         PRIV_SYS_TRANS_LABEL
 538  537  
↓ open down ↓ 157 lines elided ↑ open up ↑
 696  695         available to unprivileged processes. By default, processes still have
 697  696         the basic privileges.
 698  697  
 699  698  
 700  699         The privileges PRIV_PROC_SETID and PRIV_PROC_AUDIT must be present in
 701  700         the Limit set (see below) of a process in order for set-uid root execs
 702  701         to be successful, that is, get an effective UID of 0 and additional
 703  702         privileges.
 704  703  
 705  704  
 706      -       The privilege implementation in Solaris extends the process credential
      705 +       The privilege implementation in illumos extends the process credential
 707  706         with four privilege sets:
 708  707  
 709  708         I, the inheritable set
 710  709                                   The privileges inherited on exec.
 711  710  
 712  711  
 713  712         P, the permitted set
 714  713                                   The maximum set of privileges for the
 715  714                                   process.
 716  715  
↓ open down ↓ 115 lines elided ↑ open up ↑
 832  831  
 833  832     Privilege Escalation
 834  833         In certain circumstances, a single privilege could lead to a process
 835  834         gaining one or more additional privileges that were not explicitly
 836  835         granted to that process. To prevent such an escalation of privileges,
 837  836         the security policy requires explicit permission for those additional
 838  837         privileges.
 839  838  
 840  839  
 841  840         Common examples of escalation are those mechanisms that allow
 842      -       modification of system resources through "raw'' interfaces; for
 843      -       example, changing kernel data structures through /dev/kmem or changing
 844      -       files through /dev/dsk/*.  Escalation also occurs when a process
 845      -       controls processes with more privileges than the controlling process. A
 846      -       special case of this is manipulating or creating objects owned by UID 0
 847      -       or trying to obtain UID 0 using setuid(2). The special treatment of UID
 848      -       0 is needed because the UID 0 owns all system configuration files and
      841 +       modification of system resources through "raw" interfaces; for example,
      842 +       changing kernel data structures through /dev/kmem or changing files
      843 +       through /dev/dsk/*.  Escalation also occurs when a process controls
      844 +       processes with more privileges than the controlling process. A special
      845 +       case of this is manipulating or creating objects owned by UID 0 or
      846 +       trying to obtain UID 0 using setuid(2). The special treatment of UID 0
      847 +       is needed because the UID 0 owns all system configuration files and
 849  848         ordinary file protection mechanisms allow processes with UID 0 to
 850  849         modify the system configuration. With appropriate file modifications, a
 851  850         given process running with an effective UID of 0 can gain all
 852  851         privileges.
 853  852  
 854  853  
 855  854         In situations where a process might obtain UID 0, the security policy
 856  855         requires additional privileges, up to the full set of privileges. Such
 857  856         restrictions could be relaxed or removed at such time as additional
 858  857         mechanisms for protection of system files became available. There are
 859      -       no such mechanisms in the current Solaris release.
      858 +       no such mechanisms in the current release.
 860  859  
 861  860  
 862  861         The use of UID 0 processes should be limited as much as possible. They
 863  862         should be replaced with programs running under a different UID but with
 864  863         exactly the privileges they need.
 865  864  
 866  865  
 867  866         Daemons that never need to exec subprocesses should remove the
 868  867         PRIV_PROC_EXEC privilege from their permitted and limit sets.
 869  868  
↓ open down ↓ 47 lines elided ↑ open up ↑
 917  916         socket(3SOCKET), t_bind(3NSL), timer_create(3C), ucred_get(3C),
 918  917         exec_attr(4), proc(4), system(4), user_attr(4), xVM(5), ddi_cred(9F),
 919  918         drv_priv(9F), priv_getbyname(9F), priv_policy(9F),
 920  919         priv_policy_choice(9F), priv_policy_only(9F)
 921  920  
 922  921  
 923  922         System Administration Guide: Security Services
 924  923  
 925  924  
 926  925  
 927      -                               February 28, 2018                 PRIVILEGES(5)
      926 +                                August 26, 2019                  PRIVILEGES(5)
    
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX