blob: 70600e7002b00407a4e2a4da8ef94ea8ed07f5a9 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
|
#!/bin/bash
. ../../../prepare.inc.sh
. ../../../toolbox.inc.sh
# ---- do the actual testing ----
result=PASS
echo "++++ BEGINNING TEST" >$OUTPUTFILE
# create a keyring and attach it to the session keyring
marker "ADD KEYRING"
create_keyring wibble @s
expect_keyid keyringid
# stick a key in the keyring
marker "ADD KEY"
create_key user lizard gizzard $keyringid
expect_keyid keyid
# changing the key's ownership is not supported before 2.6.18-rc1
if kernel_older_than 2.6.18
then
marker "CHOWN"
chown_key --fail $keyid 1
expect_error EOPNOTSUPP
elif [ `id -u` != 0 ]
then
# must be running as root for this to work
marker "CHOWN"
chown_key --fail $keyid 1
expect_error EACCES
else
marker "CHOWN"
chown_key $keyid 1
marker "CHOWN BACK"
chown_key $keyid 0
fi
# changing the key's group ownership is supported (change to "bin" group)
if [ `id -u` != 0 ]
then
marker "CHGRP"
chgrp_key --fail $keyid 1
expect_error EACCES
else
marker "CHGRP"
chgrp_key $keyid 1
describe_key $keyid
expect_key_rdesc rdesc "user@.*@1@[0-9a-f]*@lizard"
fi
# check that each permission can be granted to the key
marker "ITERATE PERMISSIONS"
for i in \
00210002 00210004 00210008 00210010 \
00210200 00210400 00210800 00211000 \
00230000 00250000 00290000 00310000 \
02210000 04210000 08210000 10210000
do
set_key_perm $keyid 0x$i
describe_key $keyid
expect_key_rdesc rdesc "user@.*@.*@$i@lizard"
done
# check that we can't use group perms instead of user perms to view the key
# (our UID matches that of the key)
marker "VIEW GROUP PERMISSIONS"
set_key_perm $keyid 0x00201f00
describe_key --fail $keyid
expect_error EACCES
# check that we can't use other perms instead of user perms to view the key
# (our UID matches that of the key)
marker "VIEW OTHER PERMISSIONS"
set_key_perm $keyid 0x0020001f
describe_key --fail $keyid
expect_error EACCES
# check that taking away setattr permission renders the key immune to setperm
marker "REMOVE SETATTR"
set_key_perm $keyid 0x1f1f1f1f
describe_key $keyid
expect_key_rdesc rdesc "user@.*@.*@.*@lizard"
marker "REINSTATE SETATTR"
set_key_perm --fail $keyid 0x3f3f1f1f
expect_error EACCES
# remove the keyring we added
marker "UNLINK KEYRING"
unlink_key $keyringid @s
echo "++++ FINISHED TEST: $result" >>$OUTPUTFILE
# --- then report the results in the database ---
toolbox_report_result $TEST $result
|