diff options
Diffstat (limited to 'usr.sbin/jexec')
| -rw-r--r-- | usr.sbin/jexec/Makefile | 7 | ||||
| -rw-r--r-- | usr.sbin/jexec/Makefile.depend | 18 | ||||
| -rw-r--r-- | usr.sbin/jexec/jexec.8 | 135 | ||||
| -rw-r--r-- | usr.sbin/jexec/jexec.c | 198 | 
4 files changed, 358 insertions, 0 deletions
| diff --git a/usr.sbin/jexec/Makefile b/usr.sbin/jexec/Makefile new file mode 100644 index 000000000000..2f32dc945401 --- /dev/null +++ b/usr.sbin/jexec/Makefile @@ -0,0 +1,7 @@ +PROG=	jexec +MAN=	jexec.8 +LIBADD=	jail util + +PACKAGE=jail + +.include <bsd.prog.mk> diff --git a/usr.sbin/jexec/Makefile.depend b/usr.sbin/jexec/Makefile.depend new file mode 100644 index 000000000000..a6495919e286 --- /dev/null +++ b/usr.sbin/jexec/Makefile.depend @@ -0,0 +1,18 @@ +# Autogenerated - do NOT edit! + +DIRDEPS = \ +	include \ +	include/arpa \ +	include/xlocale \ +	lib/${CSU_DIR} \ +	lib/libc \ +	lib/libcompiler_rt \ +	lib/libjail \ +	lib/libutil \ + + +.include <dirdeps.mk> + +.if ${DEP_RELDIR} == ${_DEP_RELDIR} +# local dependencies - needed for -jN in clean tree +.endif diff --git a/usr.sbin/jexec/jexec.8 b/usr.sbin/jexec/jexec.8 new file mode 100644 index 000000000000..afcc1839ef75 --- /dev/null +++ b/usr.sbin/jexec/jexec.8 @@ -0,0 +1,135 @@ +.\" +.\" Copyright (c) 2003 Mike Barcroft <mike@FreeBSD.org> +.\" All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\"    notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\"    notice, this list of conditions and the following disclaimer in the +.\"    documentation and/or other materials provided with the distribution. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.Dd March 5, 2025 +.Dt JEXEC 8 +.Os +.Sh NAME +.Nm jexec +.Nd "execute a command inside an existing jail" +.Sh SYNOPSIS +.Nm +.Op Fl l +.Op Fl d Ar working-directory +.Op Fl u Ar username | Fl U Ar username +.Ar jail Op Ar command ... +.Sh DESCRIPTION +The +.Nm +utility executes +.Ar command +inside the +.Ar jail +identified by its jid or name. +If +.Ar command +is not specified then the user's shell is used. +.Pp +The following options are available: +.Bl -tag -width indent +.It Fl d Ar working-directory +The working directory for running commands inside the jail. +The default is the jail root directory. +.It Fl l +Execute in a clean environment. +The environment is discarded except for +.Ev HOME , SHELL , TERM , USER , +and anything from the login class capability database for the user. +.Ev PATH +is set to "/bin:/usr/bin". +If a user is specified (via +.Fl u +or +.Fl U ) , +and absent the +.Fl d +option, commands are run from that (possibly jailed) user's directory. +.It Fl u Ar username +The user name from host environment as whom the +.Ar command +should run. +This is the default. +.It Fl U Ar username +The user name from jailed environment as whom the +.Ar command +should run. +.El +.Sh EXAMPLES +.Ss Example 1 : Open a shell in a jail +The following command specifies a jail by its name and utilizes the current +user's shell: +.Pp +.Dl # jexec name +.Pp +It is also possible to specify a jail by its jid: +.Pp +.Dl # jexec JID +.Ss Example 2 : Run a single command without opening a shell +The following command runs +.Ql uname -a +in a jail called +.Dq name . +Since a command is specified explicitly, +.Nm +does not spawn an interactive shell. +Instead, +.Nm +executes the specified command directly. +.Pp +.Dl # jexec name uname -a +.Ss Example 3 : Open a shell in a jail with a clean environment +The following command opens a +.Xr sh 1 +shell in a jail with a clean environment: +.Pp +.Dl # jexec -l name sh +.Ss Example 4 : Open a shell in a jail with the login command +The following command utilizes +.Xr login 1 +to access the jail, submitting an audit record, and displaying the +user's last login, system copyright, and +.Xr motd 5 +message: +.Pp +.Dl # jexec -l name login -f root +.Sh SEE ALSO +.Xr jail_attach 2 , +.Xr jail 8 , +.Xr jls 8 +.Sh HISTORY +The +.Nm +utility was added in +.Fx 5.1 . +.Sh BUGS +If the jail is not identified by +.Ar jid +there is a possible race in between the lookup of the jail +and executing the command inside the jail. +Giving a +.Ar jid +has a similar race as another process can stop the jail and +start another one after the user looked up the +.Ar jid . diff --git a/usr.sbin/jexec/jexec.c b/usr.sbin/jexec/jexec.c new file mode 100644 index 000000000000..a1e443c5ba04 --- /dev/null +++ b/usr.sbin/jexec/jexec.c @@ -0,0 +1,198 @@ +/*- + * SPDX-License-Identifier: BSD-2-Clause + * + * Copyright (c) 2003 Mike Barcroft <mike@FreeBSD.org> + * Copyright (c) 2008 Bjoern A. Zeeb <bz@FreeBSD.org> + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + *    notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + *    notice, this list of conditions and the following disclaimer in the + *    documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#include <sys/param.h> +#include <sys/jail.h> +#include <sys/socket.h> +#include <sys/sysctl.h> + +#include <arpa/inet.h> +#include <netinet/in.h> + +#include <err.h> +#include <errno.h> +#include <jail.h> +#include <limits.h> +#include <login_cap.h> +#include <paths.h> +#include <pwd.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <unistd.h> + +extern char **environ; + +static void	get_user_info(const char *username, const struct passwd **pwdp, +    login_cap_t **lcapp); +static void	usage(void); + +int +main(int argc, char *argv[]) +{ +	int jid; +	login_cap_t *lcap = NULL; +	int ch, clean, dflag, uflag, Uflag; +	char *cleanenv; +	const struct passwd *pwd = NULL; +	const char *username, *shell, *term; +	const char *workdir; + +	ch = clean = dflag = uflag = Uflag = 0; +	username = NULL; +	workdir = "/"; + +	while ((ch = getopt(argc, argv, "d:lnu:U:")) != -1) { +		switch (ch) { +		case 'd': +			workdir = optarg; +			dflag = 1; +			break; +		case 'l': +			clean = 1; +			break; +		case 'n': +			/* Specified name, now unused */ +			break; +		case 'u': +			username = optarg; +			uflag = 1; +			break; +		case 'U': +			username = optarg; +			Uflag = 1; +			break; +		default: +			usage(); +		} +	} +	argc -= optind; +	argv += optind; +	if (argc < 1) +		usage(); +	if (uflag && Uflag) +		usage(); +	if (uflag || (clean && !Uflag)) +		/* User info from the home environment */ +		get_user_info(username, &pwd, &lcap); + +	/* Attach to the jail */ +	jid = jail_getid(argv[0]); +	if (jid < 0) +		errx(1, "%s", jail_errmsg); +	if (jail_attach(jid) == -1) +		err(1, "jail_attach(%d)", jid); +	if (chdir(workdir) == -1) +		err(1, "chdir(): %s", workdir); + +	/* Set up user environment */ +	if (clean || username != NULL) { +		if (Uflag) +			/* User info from the jail environment */ +			get_user_info(username, &pwd, &lcap); +		if (clean) { +			term = getenv("TERM"); +			cleanenv = NULL; +			environ = &cleanenv; +			setenv("PATH", "/bin:/usr/bin", 1); +			if (term != NULL) +				setenv("TERM", term, 1); +		} +		if (setgid(pwd->pw_gid) != 0) +			err(1, "setgid"); +		if (setusercontext(lcap, pwd, pwd->pw_uid, username +		    ? LOGIN_SETALL & ~LOGIN_SETGROUP & ~LOGIN_SETLOGIN +		    : LOGIN_SETPATH | LOGIN_SETENV) != 0) +			err(1, "setusercontext"); +		login_close(lcap); +		setenv("USER", pwd->pw_name, 1); +		setenv("HOME", pwd->pw_dir, 1); +		setenv("SHELL", +		    *pwd->pw_shell ? pwd->pw_shell : _PATH_BSHELL, 1); +		if (clean && username && !dflag && chdir(pwd->pw_dir) < 0) +			err(1, "chdir: %s", pwd->pw_dir); +		endpwent(); +	} + +	/* Run the specified command, or the shell */ +	if (argc > 1) { +		if (execvp(argv[1], argv + 1) < 0) +			err(1, "execvp: %s", argv[1]); +	} else { +		if (!(shell = getenv("SHELL"))) +			shell = _PATH_BSHELL; +		if (execlp(shell, shell, "-i", NULL) < 0) +			err(1, "execlp: %s", shell); +	} +	exit(0); +} + +static void +get_user_info(const char *username, const struct passwd **pwdp, +    login_cap_t **lcapp) +{ +	uid_t uid; +	const struct passwd *pwd; + +	errno = 0; +	if (username) { +		pwd = getpwnam(username); +		if (pwd == NULL) { +			if (errno) +				err(1, "getpwnam: %s", username); +			else +				errx(1, "%s: no such user", username); +		} +	} else { +		uid = getuid(); +		pwd = getpwuid(uid); +		if (pwd == NULL) { +			if (errno) +				err(1, "getpwuid: %d", uid); +			else +				errx(1, "unknown uid: %d", uid); +		} +	} +	*pwdp = pwd; +	*lcapp = login_getpwclass(pwd); +	if (*lcapp == NULL) +		err(1, "getpwclass: %s", pwd->pw_name); +	if (initgroups(pwd->pw_name, pwd->pw_gid) < 0) +		err(1, "initgroups: %s", pwd->pw_name); +} + +static void +usage(void) +{ + +	fprintf(stderr, "%s\n", +	    "usage: jexec [-l] [-d working-directory] [-u username | -U username] jail\n" +	    "       [command ...]"); +	exit(1); +} | 
