summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshd_config.5
diff options
context:
space:
mode:
authordjm <djm@openbsd.org>2011-06-22 21:57:01 +0000
committerdjm <djm@openbsd.org>2011-06-22 21:57:01 +0000
commit40eff873ad90503415f6e6a0c22e1e5f4be0ff3c (patch)
tree6ff2391ed1c555a180037d91a4c56f5de5950e26 /usr.bin/ssh/sshd_config.5
parentreuse the multistate option arrays to pretty-print options for "sshd -T" (diff)
downloadwireguard-openbsd-40eff873ad90503415f6e6a0c22e1e5f4be0ff3c.tar.xz
wireguard-openbsd-40eff873ad90503415f6e6a0c22e1e5f4be0ff3c.zip
introduce sandboxing of the pre-auth privsep child using systrace(4).
This introduces a new "UsePrivilegeSeparation=sandbox" option for sshd_config that applies mandatory restrictions on the syscalls the privsep child can perform. This prevents a compromised privsep child from being used to attack other hosts (by opening sockets and proxying) or probing local kernel attack surface. The sandbox is implemented using systrace(4) in unsupervised "fast-path" mode, where a list of permitted syscalls is supplied. Any syscall not on the list results in SIGKILL being sent to the privsep child. Note that this requires a kernel with the new SYSTR_POLICY_KILL option. UsePrivilegeSeparation=sandbox will become the default in the future so please start testing it now. feedback dtucker@; ok markus@
Diffstat (limited to 'usr.bin/ssh/sshd_config.5')
-rw-r--r--usr.bin/ssh/sshd_config.510
1 files changed, 8 insertions, 2 deletions
diff --git a/usr.bin/ssh/sshd_config.5 b/usr.bin/ssh/sshd_config.5
index 69de8d4d2b9..a8f46c4d256 100644
--- a/usr.bin/ssh/sshd_config.5
+++ b/usr.bin/ssh/sshd_config.5
@@ -33,8 +33,8 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.\" $OpenBSD: sshd_config.5,v 1.133 2011/05/23 07:10:21 jmc Exp $
-.Dd $Mdocdate: May 23 2011 $
+.\" $OpenBSD: sshd_config.5,v 1.134 2011/06/22 21:57:01 djm Exp $
+.Dd $Mdocdate: June 22 2011 $
.Dt SSHD_CONFIG 5
.Os
.Sh NAME
@@ -1048,6 +1048,12 @@ The goal of privilege separation is to prevent privilege
escalation by containing any corruption within the unprivileged processes.
The default is
.Dq yes .
+If
+.Cm UsePrivilegeSeparation
+is set to
+.Dq sandbox
+then the pre-authentication unprivileged process is subject to additional
+restrictions.
.It Cm X11DisplayOffset
Specifies the first display number available for
.Xr sshd 8 Ns 's