]>
Commit | Line | Data |
---|---|---|
d8f41ccd A |
1 | /* |
2 | * Copyright (c) 2008,2010-2013 Apple Inc. All Rights Reserved. | |
3 | * | |
4 | * @APPLE_LICENSE_HEADER_START@ | |
5 | * | |
6 | * This file contains Original Code and/or Modifications of Original Code | |
7 | * as defined in and that are subject to the Apple Public Source License | |
8 | * Version 2.0 (the 'License'). You may not use this file except in | |
9 | * compliance with the License. Please obtain a copy of the License at | |
10 | * http://www.opensource.apple.com/apsl/ and read it before using this | |
11 | * file. | |
12 | * | |
13 | * The Original Code and all software distributed under the License are | |
14 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | |
15 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, | |
16 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | |
17 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. | |
18 | * Please see the License for the specific language governing rights and | |
19 | * limitations under the License. | |
20 | * | |
21 | * @APPLE_LICENSE_HEADER_END@ | |
22 | */ | |
23 | ||
24 | #include "SecTask.h" | |
866f8763 | 25 | #include "SecTaskPriv.h" |
d8f41ccd A |
26 | |
27 | #include <utilities/debugging.h> | |
d64be36e | 28 | #include <utilities/entitlements.h> |
d8f41ccd A |
29 | |
30 | #include <AssertMacros.h> | |
31 | #include <CoreFoundation/CFRuntime.h> | |
32 | #include <IOKit/IOKitLib.h> | |
33 | #include <IOKit/IOCFUnserialize.h> | |
34 | #include <System/sys/codesign.h> | |
35 | #include <bsm/libbsm.h> | |
36 | #include <inttypes.h> | |
5c19dc3a | 37 | #include <syslog.h> |
d8f41ccd | 38 | #include <utilities/SecCFWrappers.h> |
b54c578e | 39 | #include <xpc/private.h> |
d8f41ccd | 40 | |
d8f41ccd | 41 | #include <sys/sysctl.h> |
866f8763 A |
42 | |
43 | #if TARGET_OS_OSX | |
44 | /* These won't exist until we unify codesigning */ | |
b54c578e A |
45 | #include <Security/SecCode.h> |
46 | #include <Security/SecCodePriv.h> | |
47 | #include <Security/SecRequirement.h> | |
866f8763 | 48 | #endif /* TARGET_OS_OSX */ |
d8f41ccd A |
49 | |
50 | struct __SecTask { | |
51 | CFRuntimeBase base; | |
52 | ||
d8f41ccd A |
53 | audit_token_t token; |
54 | ||
55 | /* Track whether we've loaded entitlements independently since after the | |
56 | * load, entitlements may legitimately be NULL */ | |
57 | Boolean entitlementsLoaded; | |
58 | CFDictionaryRef entitlements; | |
fa7225c8 A |
59 | |
60 | /* for debugging only, shown by debugDescription */ | |
61 | int lastFailure; | |
d8f41ccd A |
62 | }; |
63 | ||
64 | static bool check_task(SecTaskRef task) { | |
65 | return SecTaskGetTypeID() == CFGetTypeID(task); | |
66 | } | |
67 | ||
68 | static void SecTaskFinalize(CFTypeRef cfTask) | |
69 | { | |
70 | SecTaskRef task = (SecTaskRef) cfTask; | |
866f8763 | 71 | CFReleaseNull(task->entitlements); |
d8f41ccd A |
72 | } |
73 | ||
74 | ||
75 | // Define PRIdPID (proper printf format string for pid_t) | |
76 | #define PRIdPID PRId32 | |
77 | ||
78 | static CFStringRef SecTaskCopyDebugDescription(CFTypeRef cfTask) | |
79 | { | |
80 | SecTaskRef task = (SecTaskRef) cfTask; | |
81 | pid_t pid; | |
866f8763 | 82 | audit_token_to_au32(task->token, NULL, NULL, NULL, NULL, NULL, &pid, NULL, NULL); |
d8f41ccd | 83 | |
d8f41ccd A |
84 | const char *task_name; |
85 | int mib[] = {CTL_KERN, KERN_PROC, KERN_PROC_PID, pid}; | |
86 | struct kinfo_proc kp; | |
87 | size_t len = sizeof(kp); | |
88 | if (sysctl(mib, 4, &kp, &len, NULL, 0) == -1 || len == 0) | |
89 | task_name = strerror(errno); | |
90 | else | |
91 | task_name = kp.kp_proc.p_comm; | |
d8f41ccd | 92 | |
fa7225c8 A |
93 | return CFStringCreateWithFormat(CFGetAllocator(task), NULL, CFSTR("%s[%" PRIdPID "]/%d#%d LF=%d"), task_name, pid, |
94 | task->entitlementsLoaded, task->entitlements ? (int)CFDictionaryGetCount(task->entitlements) : -1, task->lastFailure); | |
d8f41ccd A |
95 | } |
96 | ||
97 | CFGiblisWithFunctions(SecTask, NULL, NULL, SecTaskFinalize, NULL, NULL, NULL, SecTaskCopyDebugDescription, NULL, NULL, NULL) | |
98 | ||
99 | static SecTaskRef init_task_ref(CFAllocatorRef allocator) | |
100 | { | |
101 | CFIndex extra = sizeof(struct __SecTask) - sizeof(CFRuntimeBase); | |
102 | return (SecTaskRef) _CFRuntimeCreateInstance(allocator, SecTaskGetTypeID(), extra, NULL); | |
103 | } | |
104 | ||
105 | SecTaskRef SecTaskCreateFromSelf(CFAllocatorRef allocator) | |
106 | { | |
107 | SecTaskRef task = init_task_ref(allocator); | |
108 | if (task != NULL) { | |
109 | ||
866f8763 A |
110 | kern_return_t kr = KERN_FAILURE; |
111 | mach_msg_type_number_t autoken_cnt = TASK_AUDIT_TOKEN_COUNT; | |
112 | kr = task_info(mach_task_self(), TASK_AUDIT_TOKEN, (task_info_t)&task->token, &autoken_cnt); | |
113 | if (kr == KERN_SUCCESS) { | |
114 | task->entitlementsLoaded = false; | |
115 | task->entitlements = NULL; | |
116 | } else { | |
117 | CFReleaseNull(task); | |
118 | } | |
d8f41ccd A |
119 | } |
120 | ||
121 | return task; | |
122 | } | |
123 | ||
124 | SecTaskRef SecTaskCreateWithAuditToken(CFAllocatorRef allocator, audit_token_t token) | |
125 | { | |
126 | SecTaskRef task = init_task_ref(allocator); | |
127 | if (task != NULL) { | |
128 | ||
129 | memcpy(&task->token, &token, sizeof(token)); | |
130 | task->entitlementsLoaded = false; | |
131 | task->entitlements = NULL; | |
d8f41ccd A |
132 | } |
133 | ||
134 | return task; | |
135 | } | |
136 | ||
b54c578e A |
137 | _Nullable SecTaskRef |
138 | SecTaskCreateWithXPCMessage(xpc_object_t _Nonnull message) | |
139 | { | |
140 | audit_token_t token; | |
141 | ||
142 | if (message == NULL || xpc_get_type(message) != XPC_TYPE_DICTIONARY) { | |
143 | return NULL; | |
144 | } | |
145 | xpc_dictionary_get_audit_token(message, &token); | |
146 | ||
147 | return SecTaskCreateWithAuditToken(NULL, token); | |
148 | } | |
149 | ||
150 | ||
151 | ||
d8f41ccd A |
152 | struct csheader { |
153 | uint32_t magic; | |
154 | uint32_t length; | |
155 | }; | |
156 | ||
157 | static int | |
158 | csops_task(SecTaskRef task, int ops, void *blob, size_t size) | |
159 | { | |
fa7225c8 | 160 | int rc; |
866f8763 A |
161 | |
162 | pid_t pid; | |
163 | audit_token_to_au32(task->token, NULL, NULL, NULL, NULL, NULL, &pid, NULL, NULL); | |
164 | rc = csops_audittoken(pid, ops, blob, size, &task->token); | |
165 | ||
fa7225c8 A |
166 | task->lastFailure = (rc == -1) ? errno : 0; |
167 | return rc; | |
d8f41ccd A |
168 | } |
169 | ||
dbe77505 A |
170 | static CFStringRef |
171 | SecTaskCopyIdentifier(SecTaskRef task, int op, CFErrorRef *error) | |
d8f41ccd A |
172 | { |
173 | CFStringRef signingId = NULL; | |
174 | char *data = NULL; | |
175 | struct csheader header; | |
176 | uint32_t bufferlen; | |
177 | int ret; | |
178 | ||
dbe77505 | 179 | ret = csops_task(task, op, &header, sizeof(header)); |
d8f41ccd A |
180 | if (ret != -1 || errno != ERANGE) |
181 | return NULL; | |
182 | ||
183 | bufferlen = ntohl(header.length); | |
184 | /* check for insane values */ | |
185 | if (bufferlen > 1024 * 1024 || bufferlen < 8) { | |
186 | ret = EINVAL; | |
187 | goto out; | |
188 | } | |
189 | data = malloc(bufferlen + 1); | |
190 | if (data == NULL) { | |
191 | ret = ENOMEM; | |
192 | goto out; | |
193 | } | |
dbe77505 | 194 | ret = csops_task(task, op, data, bufferlen); |
d8f41ccd A |
195 | if (ret) { |
196 | ret = errno; | |
197 | goto out; | |
198 | } | |
199 | data[bufferlen] = '\0'; | |
200 | ||
201 | signingId = CFStringCreateWithCString(NULL, data + 8, kCFStringEncodingUTF8); | |
202 | ||
203 | out: | |
204 | if (data) | |
205 | free(data); | |
206 | if (ret && error) | |
207 | *error = CFErrorCreate(NULL, kCFErrorDomainPOSIX, ret, NULL); | |
208 | ||
209 | return signingId; | |
210 | } | |
211 | ||
dbe77505 A |
212 | CFStringRef |
213 | SecTaskCopySigningIdentifier(SecTaskRef task, CFErrorRef *error) | |
214 | { | |
215 | return SecTaskCopyIdentifier(task, CS_OPS_IDENTITY, error); | |
216 | } | |
217 | ||
218 | CFStringRef | |
219 | SecTaskCopyTeamIdentifier(SecTaskRef task, CFErrorRef *error) | |
220 | { | |
221 | return SecTaskCopyIdentifier(task, CS_OPS_TEAMID, error); | |
222 | } | |
223 | ||
fa7225c8 A |
224 | uint32_t |
225 | SecTaskGetCodeSignStatus(SecTaskRef task) | |
226 | { | |
227 | uint32_t flags = 0; | |
228 | if (csops_task(task, CS_OPS_STATUS, &flags, sizeof(flags)) != 0) | |
229 | return 0; | |
230 | return flags; | |
231 | } | |
d8f41ccd A |
232 | |
233 | static bool SecTaskLoadEntitlements(SecTaskRef task, CFErrorRef *error) | |
234 | { | |
235 | CFMutableDictionaryRef entitlements = NULL; | |
236 | struct csheader header; | |
237 | uint8_t *buffer = NULL; | |
238 | uint32_t bufferlen; | |
239 | int ret; | |
240 | ||
d8f41ccd A |
241 | ret = csops_task(task, CS_OPS_ENTITLEMENTS_BLOB, &header, sizeof(header)); |
242 | /* Any other combination means no entitlements */ | |
d64be36e A |
243 | if (ret == -1) { |
244 | if (errno != ERANGE) { | |
e0e0d90e A |
245 | int entitlementErrno = errno; |
246 | ||
d64be36e | 247 | uint32_t cs_flags = -1; |
e0e0d90e A |
248 | if (-1 == csops_task(task, CS_OPS_STATUS, &cs_flags, sizeof(cs_flags))) { |
249 | syslog(LOG_NOTICE, "Failed to get cs_flags, error=%d", errno); | |
250 | } | |
251 | ||
d64be36e A |
252 | if (cs_flags != 0) { // was signed |
253 | pid_t pid; | |
254 | audit_token_to_au32(task->token, NULL, NULL, NULL, NULL, NULL, &pid, NULL, NULL); | |
255 | syslog(LOG_NOTICE, "SecTaskLoadEntitlements failed error=%d cs_flags=%x, pid=%d", entitlementErrno, cs_flags, pid); // to ease diagnostics | |
256 | ||
257 | CFStringRef description = SecTaskCopyDebugDescription(task); | |
258 | char *descriptionBuf = NULL; | |
259 | CFIndex descriptionSize = CFStringGetLength(description) * 4; | |
260 | descriptionBuf = (char *)malloc(descriptionSize); | |
261 | if (!CFStringGetCString(description, descriptionBuf, descriptionSize, kCFStringEncodingUTF8)) { | |
262 | descriptionBuf[0] = 0; | |
263 | } | |
264 | ||
265 | syslog(LOG_NOTICE, "SecTaskCopyDebugDescription: %s", descriptionBuf); | |
266 | CFReleaseNull(description); | |
267 | free(descriptionBuf); | |
268 | } | |
269 | task->lastFailure = entitlementErrno; // was overwritten by csops_task(CS_OPS_STATUS) above | |
270 | ||
271 | // EINVAL is what the kernel says for unsigned code, so we'll have to let that pass | |
272 | if (entitlementErrno == EINVAL) { | |
273 | task->entitlementsLoaded = true; | |
274 | return true; | |
275 | } | |
276 | ret = entitlementErrno; // what really went wrong | |
277 | goto out; // bail out | |
278 | } | |
d8f41ccd A |
279 | bufferlen = ntohl(header.length); |
280 | /* check for insane values */ | |
281 | if (bufferlen > 1024 * 1024 || bufferlen < 8) { | |
fa7225c8 | 282 | ret = E2BIG; |
d8f41ccd A |
283 | goto out; |
284 | } | |
285 | buffer = malloc(bufferlen); | |
286 | if (buffer == NULL) { | |
287 | ret = ENOMEM; | |
288 | goto out; | |
289 | } | |
290 | ret = csops_task(task, CS_OPS_ENTITLEMENTS_BLOB, buffer, bufferlen); | |
291 | if (ret) { | |
292 | ret = errno; | |
293 | goto out; | |
294 | } | |
295 | ||
296 | CFDataRef data = CFDataCreateWithBytesNoCopy(kCFAllocatorDefault, buffer+8, bufferlen-8, kCFAllocatorNull); | |
297 | entitlements = (CFMutableDictionaryRef) CFPropertyListCreateWithData(kCFAllocatorDefault, data, kCFPropertyListMutableContainers, NULL, error); | |
866f8763 | 298 | CFReleaseNull(data); |
d8f41ccd | 299 | |
d64be36e | 300 | if ((entitlements==NULL) || (CFGetTypeID(entitlements)!=CFDictionaryGetTypeID())){ |
fa7225c8 | 301 | ret = EDOM; // don't use EINVAL here; it conflates problems with syscall error returns |
d8f41ccd A |
302 | goto out; |
303 | } | |
d64be36e A |
304 | |
305 | bool entitlementsModified = updateCatalystEntitlements(entitlements); | |
306 | if (entitlementsModified) { | |
307 | pid_t pid; | |
308 | audit_token_to_au32(task->token, NULL, NULL, NULL, NULL, NULL, &pid, NULL, NULL); | |
309 | secinfo("SecTask", "Fixed catalyst entitlements for process %d", pid); | |
310 | } | |
d8f41ccd A |
311 | } |
312 | ||
313 | task->entitlements = entitlements ? CFRetain(entitlements) : NULL; | |
314 | task->entitlementsLoaded = true; | |
315 | ||
316 | out: | |
866f8763 | 317 | CFReleaseNull(entitlements); |
d8f41ccd A |
318 | if(buffer) |
319 | free(buffer); | |
320 | if (ret && error && *error==NULL) | |
321 | *error = CFErrorCreate(NULL, kCFErrorDomainPOSIX, ret, NULL); | |
322 | return ret == 0; | |
323 | } | |
324 | ||
325 | ||
326 | CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error) | |
327 | { | |
328 | CFTypeRef value = NULL; | |
329 | require(check_task(task), out); | |
330 | ||
331 | /* Load entitlements if necessary */ | |
332 | if (task->entitlementsLoaded == false) { | |
333 | require_quiet(SecTaskLoadEntitlements(task, error), out); | |
334 | } | |
335 | ||
336 | if (task->entitlements != NULL) { | |
337 | value = CFDictionaryGetValue(task->entitlements, entitlement); | |
338 | ||
339 | /* Return something the caller must release */ | |
340 | if (value != NULL) { | |
341 | CFRetain(value); | |
342 | } | |
343 | } | |
344 | out: | |
345 | return value; | |
346 | } | |
347 | ||
348 | CFDictionaryRef SecTaskCopyValuesForEntitlements(SecTaskRef task, CFArrayRef entitlements, CFErrorRef *error) | |
349 | { | |
350 | CFMutableDictionaryRef values = NULL; | |
351 | require(check_task(task), out); | |
352 | ||
353 | /* Load entitlements if necessary */ | |
354 | if (task->entitlementsLoaded == false) { | |
355 | SecTaskLoadEntitlements(task, error); | |
356 | } | |
357 | ||
358 | /* Iterate over the passed in entitlements, populating the dictionary | |
359 | * If entitlements were loaded but none were present, return an empty | |
360 | * dictionary */ | |
361 | if (task->entitlementsLoaded == true) { | |
362 | ||
363 | CFIndex i, count = CFArrayGetCount(entitlements); | |
364 | values = CFDictionaryCreateMutable(CFGetAllocator(task), count, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks); | |
365 | if (task->entitlements != NULL) { | |
366 | for (i = 0; i < count; i++) { | |
367 | CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i); | |
368 | CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement); | |
369 | if (value != NULL) { | |
370 | CFDictionarySetValue(values, entitlement, value); | |
371 | } | |
372 | } | |
373 | } | |
374 | } | |
375 | out: | |
376 | return values; | |
377 | } | |
866f8763 | 378 | |
b54c578e | 379 | #if SEC_OS_OSX |
866f8763 A |
380 | /* |
381 | * Determine if the given task meets a specified requirement. | |
382 | */ | |
383 | OSStatus | |
384 | SecTaskValidateForRequirement(SecTaskRef task, CFStringRef requirement) | |
385 | { | |
386 | OSStatus status; | |
387 | SecCodeRef code = NULL; | |
388 | SecRequirementRef req = NULL; | |
389 | ||
390 | CFMutableDictionaryRef codeDict = CFDictionaryCreateMutable(kCFAllocatorDefault, 0, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks); | |
391 | CFDataRef auditData = CFDataCreate(kCFAllocatorDefault, (const UInt8 *)&task->token, sizeof(audit_token_t)); | |
392 | CFDictionarySetValue(codeDict, kSecGuestAttributeAudit, auditData); | |
393 | status = SecCodeCopyGuestWithAttributes(NULL, codeDict, kSecCSDefaultFlags, &code); | |
394 | CFReleaseNull(codeDict); | |
395 | CFReleaseNull(auditData); | |
396 | ||
397 | if (!status) { | |
398 | status = SecRequirementCreateWithString(requirement, | |
399 | kSecCSDefaultFlags, &req); | |
400 | } | |
401 | if (!status) { | |
402 | status = SecCodeCheckValidity(code, kSecCSDefaultFlags, req); | |
403 | } | |
404 | ||
405 | CFReleaseNull(req); | |
406 | CFReleaseNull(code); | |
407 | ||
408 | return status; | |
409 | } | |
b54c578e | 410 | #endif /* SEC_OS_OSX */ |
866f8763 A |
411 | |
412 | Boolean SecTaskEntitlementsValidated(SecTaskRef task) { | |
413 | // TODO: Cache the result | |
414 | uint32_t csflags = 0; | |
415 | const uint32_t mask = CS_VALID | CS_KILL | CS_ENTITLEMENTS_VALIDATED; | |
79b9da22 | 416 | const uint32_t debug_mask = CS_DEBUGGED | CS_ENTITLEMENTS_VALIDATED; |
866f8763 | 417 | int rc = csops_task(task, CS_OPS_STATUS, &csflags, sizeof(csflags)); |
79b9da22 A |
418 | // Allow debugged processes that were valid to continue being treated as valid |
419 | // We need this all the time (not just on internal) because third parties may need to debug their entitled process in xcode | |
420 | return (rc != -1) && ((mask & csflags) == mask || (debug_mask & csflags) == debug_mask); | |
866f8763 A |
421 | } |
422 |