Adding Software to Trusted Extensions
Any software that can be added to a Solaris system can be added
to a system that is configured with Trusted Extensions. Additionally, programs that use
Trusted Extensions APIs can be added. Adding software to a Trusted Extensions
system is similar to adding software to a Solaris system that is running
non-global zones.
For example, packaging issues affect systems that have installed non-global zones. Package parameters
define the following:
The zone scope of the package – The scope determines the type of zone in which a specific package can be installed.
The visibility of the package – Visibility determines whether a package must be installed and be identical in all zones.
The limitation of the package – One limitation is whether a package must be installed in the current zone only.
In Trusted Extensions, programs are typically installed in the global zone for use
by regular users in labeled zones. For details about installing packages in zones,
see Chapter 24, About Packages and Patches on a Solaris System With Zones Installed (Overview), in System Administration Guide: Virtualization Using the Solaris Operating System. Also, see the pkgadd(1M) man page.
At a Trusted Extensions site, the system administrator and the security administrator work
together to install software. The security administrator evaluates software additions for adherence to
security policy. When the software requires privileges or authorizations to succeed, the Security
Administrator role assigns an appropriate rights profile to the users of that software.
To import software from removable media requires authorization. An account with the Allocate
Device authorization can import or export data from removable media. Data can include
executable code. A regular user can only import data at a label within
that user's clearance.
The System Administrator role is responsible for adding the programs that the security
administrator approves.
Solaris Security Mechanisms for Software
Trusted Extensions uses the same security mechanisms as the Solaris OS. The mechanisms
include the following:
Authorizations – Users of a program can be required to have a particular authorization. For information about authorizations, see Solaris RBAC Elements and Basic Concepts in System Administration Guide: Security Services. Also, see the auth_attr(4) and getauthattr(3SECDB) man pages.
Privileges – Programs and processes can be assigned privileges. For information about privileges, see Chapter 8, Using Roles and Privileges (Overview), in System Administration Guide: Security Services. Also, see the privileges(5) man page.
The ppriv command provides a debugging utility. For details, see the ppriv(1) man page. For instructions on using this utility with programs that work in non-global zones, see Using the ppriv Utility in System Administration Guide: Virtualization Using the Solaris Operating System.
Right Profiles – Rights profiles collect security attributes in one place for assignment to users or roles. For information about rights profiles, see RBAC Rights Profiles in System Administration Guide: Security Services. Trusted Extensions adds CDE actions to the type of executables that can be assigned security attributes.
Trusted libraries – Dynamically shared libraries that are used by setuid, setgid, and privileged programs can be loaded only from trusted directories. As in the Solaris OS, the crle command is used to add a privileged program's shared library directories to the list of trusted directories. For details, see the crle(1) man page.
Evaluating Software for Security
When software has been assigned privileges or when it runs with an
alternate user ID or group ID, the software becomes trusted. Trusted software can bypass
aspects of the Trusted Extensions security policy. Be aware that you can make
software trusted even though it might not be worthy of trust. The security
administrator must wait to give privileges to software until careful scrutiny has revealed
that the software uses the privileges in a trustworthy manner.
Programs fall into three categories on a trusted system:
Programs that require no security attributes – Some programs run at a single level and require no privileges. These programs can be installed in a public directory, such as /usr/local. For access, assign the programs as commands in the rights profiles of users and roles.
Programs that run as root – Some programs execute with setuid 0. Such programs can be assigned an effective UID of 0 in a rights profile. The security administrator then assigns the profile to an administrative role.
Tip - If the application can use privileges in a trustworthy manner, assign the needed privileges to the application, and do not execute the program as root.
Programs that require privileges – Some programs might need privileges for reasons that are not obvious. Even if a program is not performing any function that seems to violate system security policy, the program might be doing something internally that violates security. For example, the program could be using a shared log file, or the program could be reading from /dev/kmem. For security concerns, see the mem(7D) man page.
Sometimes, an internal policy override is not particularly important to the application's correct operation. Rather, the override provides a convenient feature for users.
If your organization has access to the source code, check if you can remove the operations that require policy overrides without affecting the application's performance.
Developer Responsibilities When Creating Trusted Programs
Even though a program's developer can manipulate privilege sets in the source code,
if the security administrator does not assign the required privileges to the program,
the program will fail. The developer and security administrator need to cooperate when
creating trusted programs.
A developer who writes a trusted program must do the following:
Understand where the program requires privileges to do its work.
Know and follow techniques, such as privilege bracketing, for safely using privileges in programs.
Be aware of the security implications when assigning privileges to a program. The program must not violate security policy.
Compile the program by using shared libraries that are linked to the program from a trusted directory.
For additional information, see Solaris Security for Developers Guide. For examples of code for Trusted Extensions, see Solaris Trusted Extensions Developer’s Guide.
Security Administrator Responsibilities for Trusted Programs
The security administrator is responsible for testing and evaluating new software. After determining
that the software is trustworthy, the security administrator configures rights profiles and other security-relevant
attributes for the program.
The security administrator responsibilities include the following:
Make sure that the programmer and the program distribution process is trusted.
From one of the following sources, determine which privileges are required by the program:
Ask the programmer.
Search the source code for any privileges that the program expects to use.
Search the source code for any authorizations that the program requires of its users.
Use the debugging options to the ppriv command to search for use of privilege. For examples, see the ppriv(1) man page.
Examine the source code to make sure that the code behaves in a trustworthy manner regarding the privileges that the program needs to operate.
If the program fails to use privilege in a trustworthy manner, and you can modify the program's source code, then modify the code. A security consultant or developer who is knowledgeable about security can modify the code. Modifications might include privilege bracketing or checking for authorizations.
The assignment of privileges must be manual. A program that fails due to lack of privilege can be assigned privileges. Alternatively, the security administrator might decide to assign an effective UID or GID to make the privilege unnecessary.