blob: 24247a977633e8df46eabcfb107fffbee4c4cc55 [file] [log] [blame]
; Copyright (C) 2013-2020 Apple Inc. All rights reserved.
;
; Redistribution and use in source and binary forms, with or without
; modification, are permitted provided that the following conditions
; are met:
; 1. Redistributions of source code must retain the above copyright
; notice, this list of conditions and the following disclaimer.
; 2. Redistributions in binary form must reproduce the above copyright
; notice, this list of conditions and the following disclaimer in the
; documentation and/or other materials provided with the distribution.
;
; THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
; AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
; THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
; PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
; BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
; CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
; SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
; INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
; CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
; ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
; THE POSSIBILITY OF SUCH DAMAGE.
(version 1)
(deny default (with partial-symbolication))
(allow system-audit file-read-metadata)
#if __MAC_OS_X_VERSION_MIN_REQUIRED >= 101500
;;;
;;; The following rules were originally contained in 'common.sb'. We are duplicating them here so we can
;;; remove unneeded sandbox extensions.
;;;
(allow mach-register (local-name-prefix ""))
(allow mach-lookup (xpc-service-name-prefix ""))
(allow system-automount
(process-attribute is-platform-binary))
(allow file-map-executable
(subpath "/Library/Apple/System/Library/Frameworks")
(subpath "/Library/Apple/System/Library/PrivateFrameworks")
(subpath "/System/Library/Frameworks")
(subpath "/System/Library/PrivateFrameworks")
(subpath "/usr/lib")
(subpath "/usr/local/lib/sanitizers") ;; FIXME(209820)
(subpath "/usr/appleinternal/lib/sanitizers"))
(allow file-read-metadata
(literal "/etc")
(literal "/tmp")
(literal "/var")
(literal "/private/etc/localtime"))
(allow file-read-metadata (path-ancestors "/System/Volumes/Data/private"))
(allow file-read* (literal "/"))
(allow file-read*
(subpath "/Library/Apple/System")
(subpath "/Library/Filesystems/NetFSPlugins")
(subpath "/Library/Preferences/Logging") ; Logging Rethink
(subpath "/System")
(subpath "/private/var/db/dyld")
(subpath "/private/var/db/timezone")
(subpath "/usr/lib")
(subpath "/usr/share"))
(allow file-read*
(literal "/dev/autofs_nowait")
(literal "/dev/random")
(literal "/dev/urandom")
(literal "/private/etc/master.passwd")
(literal "/private/etc/passwd")
(literal "/private/etc/protocols")
(literal "/private/etc/services"))
(allow file-read*
file-write-data
(literal "/dev/null")
(literal "/dev/zero"))
(allow file-read*
file-write-data
file-ioctl
(literal "/dev/dtracehelper"))
(allow file-read*
(subpath "/usr/local/lib/sanitizers") ;; FIXME(209820)
(subpath "/usr/appleinternal/lib/sanitizers"))
(allow file-write-create
(require-all (prefix "/cores/")
(vnode-type REGULAR-FILE)))
(allow file-read*
(require-all (subpath "/AppleInternal/Library/Preferences/Logging")
(system-attribute apple-internal)))
(allow file-read* file-map-executable
(require-all (subpath "/usr/local/lib/log")
(system-attribute apple-internal)))
(allow network-outbound
(literal "/private/var/run/syslog"))
(allow ipc-posix-shm-read*
(ipc-posix-name "apple.shm.notification_center")
(ipc-posix-name-prefix "apple.cfprefs."))
(allow mach-lookup (with report) (with telemetry)
(global-name "com.apple.analyticsd.messagetracer")
(global-name "com.apple.appsleep")
(global-name "com.apple.bsd.dirhelper")
(global-name "com.apple.cfprefsd.agent")
(global-name "com.apple.cfprefsd.daemon")
(global-name "com.apple.espd")
(global-name "com.apple.secinitd")
(global-name "com.apple.system.DirectoryService.libinfo_v1")
(global-name "com.apple.system.logger")
(global-name "com.apple.system.opendirectoryd.libinfo")
(global-name "com.apple.system.opendirectoryd.membership")
(global-name "com.apple.trustd")
(global-name "com.apple.trustd.agent")
(global-name "com.apple.xpc.activity.unmanaged")
(local-name "com.apple.cfprefsd.agent"))
(with-filter (system-attribute apple-internal)
(allow mach-lookup (global-name "com.apple.internal.objc_trace")))
(define (system-network)
(allow file-read*
(literal "/Library/Preferences/com.apple.networkd.plist")
(literal "/private/var/db/nsurlstoraged/dafsaData.bin"))
(allow mach-lookup
(global-name "com.apple.SystemConfiguration.PPPController")
(global-name "com.apple.SystemConfiguration.SCNetworkReachability")
(global-name "com.apple.dnssd.service")
(global-name "com.apple.nehelper")
(global-name "com.apple.nesessionmanager")
(global-name "com.apple.networkd")
(global-name "com.apple.nsurlstorage-cache")
(global-name "com.apple.symptomsd")
(global-name "com.apple.usymptomsd"))
(allow network-outbound
(control-name "com.apple.netsrc")
(control-name "com.apple.network.statistics"))
(allow system-socket
(require-all (socket-domain AF_SYSTEM)
(socket-protocol 2)) ; SYSPROTO_CONTROL
(socket-domain AF_ROUTE))
(allow mach-lookup
(global-name "com.apple.AppSSO.service-xpc"))
(allow ipc-posix-shm-read-data
(ipc-posix-name "/com.apple.AppSSO.version")))
;;;
;;; End rules originally copied from 'system.sb'
;;;
#else
(import "system.sb")
#endif
;;; process-info* defaults to allow; deny it and then allow operations we actually need.
(deny process-info*)
(allow process-info-pidinfo)
(allow process-info-setcontrol (target self))
(deny sysctl*)
(allow sysctl-read
(sysctl-name
"hw.availcpu"
"hw.ncpu"
"hw.model" ;; Needed for bundle loading
"kern.hostname"
"kern.maxfilesperproc"
"kern.memorystatus_level"
"kern.osproductversion" ;; Needed by CFNetwork (HSTS store and others)
"kern.osversion" ;; Needed by WebKit and ASL logging.
"kern.tcsm_available" ;; Needed for IndexedDB support.
"kern.ostype"
"kern.version"
"sysctl.name2oid"
"vm.footprint_suspend")
(sysctl-name-regex #"^net.routetable")
(sysctl-name-prefix "sysctl.oidfmt.") ; Remove when <rdar://problem/64208532> is fixed.
)
(deny iokit-get-properties)
(deny mach-lookup (xpc-service-name-prefix ""))
;; Utility functions for home directory relative path filters
(define (home-regex home-relative-regex)
(regex (string-append "^" (regex-quote (param "HOME_DIR")) home-relative-regex)))
(define (home-subpath home-relative-subpath)
(subpath (string-append (param "HOME_DIR") home-relative-subpath)))
(define (home-literal home-relative-literal)
(literal (string-append (param "HOME_DIR") home-relative-literal)))
;; CFNetwork
(allow file-read-data (path "/private/var/db/nsurlstoraged/dafsaData.bin"))
;; Remove when <rdar://problem/29646094> is fixed.
(define (HEX-pattern-match-generator pattern-descriptor)
(letrec ((pattern-string ""))
(for-each (lambda (repeat-count)
(if (zero? repeat-count)
(set! pattern-string (string-append pattern-string "-"))
(let appender ((count repeat-count))
(if (> count 0)
(begin
(set! pattern-string (string-append pattern-string "[0-9A-F]"))
(appender (- count 1)))))))
pattern-descriptor)
pattern-string))
;; return a regex pattern matching string for 8-4-4-4-12 UUIDs:
(define (uuid-HEX-pattern-match-string)
(HEX-pattern-match-generator '(8 0 4 0 4 0 4 0 12)))
;; global to hold the computed UUID matching pattern.
(define *uuid-pattern* "")
(define (uuid-regex-string)
(if (zero? (string-length *uuid-pattern*))
(set! *uuid-pattern* (uuid-HEX-pattern-match-string)))
*uuid-pattern*)
;; Read-only preferences and data
(allow user-preference-read
(preference-domain
"kCFPreferencesAnyApplication"
"com.apple.DownloadAssessment"
"com.apple.WebFoundation"
"com.apple.ist.ds.appleconnect2.uat" ;; Remove after <rdar://problem/35542803> ships
"com.apple.networkConnect"))
(allow file-read*
;; Basic system paths
(subpath "/Library/Frameworks")
(subpath "/Library/Managed Preferences")
(literal "/Library/Application Support/CrashReporter/SubmitDiagInfo.domains")
;; System and user preferences
(regex #"^/Library/Managed Preferences/[^/]+/com\.apple\.networkConnect\.plist$")
;; On-disk WebKit2 framework location, to account for debug installations
;; outside of /System/Library/Frameworks
(subpath (param "WEBKIT2_FRAMEWORK_DIR")))
(allow system-fsctl (fsctl-command (_IO "h" 47)))
(allow file-read-data
(literal "/usr/local/lib/log") ; <rdar://problem/36629495>
)
;; Sandbox extensions
(define (apply-read-and-issue-extension op path-filter)
(op file-read* path-filter)
(op file-issue-extension (require-all (extension-class "com.apple.app-sandbox.read") path-filter)))
(define (apply-write-and-issue-extension op path-filter)
(op file-write* path-filter)
(op file-issue-extension (require-all (extension-class "com.apple.app-sandbox.read-write") path-filter)))
(define (read-only-and-issue-extensions path-filter)
(apply-read-and-issue-extension allow path-filter))
(define (read-write-and-issue-extensions path-filter)
(apply-read-and-issue-extension allow path-filter)
(apply-write-and-issue-extension allow path-filter))
(read-only-and-issue-extensions (extension "com.apple.app-sandbox.read"))
(read-write-and-issue-extensions (extension "com.apple.app-sandbox.read-write"))
(allow file-read* file-write* (subpath (param "DARWIN_USER_CACHE_DIR")))
(allow file-read* file-write* (subpath (param "DARWIN_USER_TEMP_DIR")))
;; IOKit user clients
(allow iokit-open
(iokit-user-client-class "RootDomainUserClient") ; Used by PowerObserver
)
;; cookied.
;; FIXME: Update for <rdar://problem/13642852>.
(allow ipc-posix-shm-read-data
(ipc-posix-name "FNetwork.defaultStorageSession")
(ipc-posix-name-regex #"\.PrivateBrowsing-")
(ipc-posix-name-regex #"^WebKit Test-")
(ipc-posix-name "/com.apple.AppSSO.version")
)
;; Various services required by CFNetwork and other frameworks
(allow mach-lookup
(global-name "com.apple.FileCoordination")
(global-name "com.apple.PowerManagement.control")
(global-name "com.apple.SystemConfiguration.configd")
(global-name "com.apple.aggregated")
(global-name "com.apple.analyticsd")
(global-name "com.apple.cookied")
(global-name "com.apple.cfnetwork.AuthBrokerAgent")
(global-name "com.apple.cfnetwork.cfnetworkagent")
(global-name "com.apple.diagnosticd")
(global-name "com.apple.ist.ds.appleconnect2.service.kdctunnelcontroller")
(global-name "com.apple.logd")
(global-name "com.apple.logd.events")
(global-name "com.apple.lsd.mapdb")
(global-name "com.apple.nesessionmanager.flow-divert-token")
(global-name "com.apple.nesessionmanager.content-filter") ;; <rdar://problem/47598758>
(global-name "com.apple.system.notification_center")
(global-name "com.apple.AppSSO.service-xpc")
)
;; Security framework
(allow mach-lookup
(global-name "com.apple.ctkd.token-client")
(global-name "com.apple.securityd.xpc")
(global-name "com.apple.CoreAuthentication.agent.libxpc")
(global-name "com.apple.ocspd")
(global-name "com.apple.SecurityServer"))
;; FIXME: This should be removed when <rdar://problem/10479685> is fixed.
;; Restrict AppSandboxed processes from creating /Library/Keychains, but allow access to the contents of /Library/Keychains:
(allow file-read-data file-read-metadata file-write*
(subpath "/Library/Keychains")
(home-subpath "/Library/Keychains"))
;; Except deny access to new-style iOS Keychain folders which are UUIDs.
(deny file-read* file-write*
(regex (string-append "/Library/Keychains/" (uuid-regex-string) "(/|$)"))
(home-regex (string-append "/Library/Keychains/" (uuid-regex-string) "(/|$)")))
(allow file-read* file-write* (subpath "/private/var/db/mds/system")) ;; FIXME: This should be removed when <rdar://problem/9538414> is fixed.
(allow user-preference-read
(preference-domain
"com.apple.crypto"
"com.apple.security"
"com.apple.security.common"
"com.apple.security.revocation"))
(allow file-read*
(subpath "/private/var/db/mds")
(literal "/private/var/db/DetachedSignatures")
; The following are needed until the causes of <rdar://problem/41487786> are resolved.
(literal "/Library/Preferences/com.apple.security.plist")
(literal "/Library/Preferences/com.apple.security.common.plist")
(literal "/Library/Preferences/com.apple.security.revocation.plist")
(home-literal "/Library/Application Support/SyncServices/Local/ClientsWithChanges/com.apple.Keychain")
(home-literal "/Library/Preferences/com.apple.security.plist")
(home-literal "/Library/Preferences/com.apple.security.revocation.plist")
; Likewise for <rdar://problem/43310000>
(literal "/Library/Preferences/com.apple.ist.ds.appleconnect2.plist")
(literal "/Library/Preferences/com.apple.ist.ds.appleconnect2.production.plist")
(home-literal "/Library/Preferences/com.apple.ist.ds.appleconnect2.plist")
(home-literal "/Library/Preferences/com.apple.ist.ds.appleconnect2.production.plist")
(home-regex (string-append "/Library/Preferences/ByHost/com\.apple\.ist\.ds\.appleconnect2\." (uuid-regex-string) "\.plist$"))
(home-regex (string-append "/Library/Preferences/ByHost/com\.apple\.ist\.ds\.appleconnect2\.production\." (uuid-regex-string) "\.plist$"))
)
(allow ipc-posix-shm-read* ipc-posix-shm-write-create ipc-posix-shm-write-data
(ipc-posix-name "com.apple.AppleDatabaseChanged"))
(system-network)
(allow network-outbound
;; Local mDNSResponder for DNS, arbitrary outbound TCP
(literal "/private/var/run/mDNSResponder")
(remote tcp))
;; FIXME should be removed when <rdar://problem/9347205> + related radar in Safari is fixed
(allow mach-lookup
(global-name "org.h5l.kcm")
(global-name "com.apple.GSSCred")
(global-name "com.apple.ist.ds.appleconnect.service.kdctunnel") ;; Remove after <rdar://problem/35542803> ships
(global-name "com.apple.system.logger"))
(allow network-outbound
(remote udp))
(allow user-preference-read
(preference-domain
"com.apple.GSS"
"com.apple.Kerberos"
"edu.mit.Kerberos"))
(allow file-read*
(literal "/private/etc/krb5.conf")
(literal "/private/etc/services")
(literal "/private/etc/hosts")
(subpath "/Library/KerberosPlugins/GSSAPI")
(subpath "/Library/KerberosPlugins/KerberosFrameworkPlugins"))
(if (defined? 'vnode-type)
(deny file-write-create (vnode-type SYMLINK)))
;; Reserve a namespace for additional protected extended attributes.
(deny file-read-xattr file-write-xattr (xattr-regex #"^com\.apple\.security\.private\."))
(deny file-read* file-write* (with no-log)
;; FIXME: Should be removed after <rdar://problem/10463881> is fixed.
(home-literal "/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2")
(home-literal "/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2-journal"))
(macro (with-filter form)
(let* ((ps (cdr form))
(extra-filter (car ps))
(rules (cdr ps)))
`(letrec
((collect
(lambda (l filters non-filters)
(if (null? l)
(list filters non-filters)
(let*
((x (car l))
(rest (cdr l)))
(if (sbpl-filter? x)
(collect rest (cons x filters) non-filters)
(collect rest filters (cons x non-filters)))))))
(inject-filter
(lambda args
(let* ((collected (collect args '() '()))
(filters (car collected))
(non-filters (cadr collected)))
(if (null? filters)
(cons ,extra-filter non-filters)
(cons (require-all (apply require-any filters) ,extra-filter) non-filters)))))
(orig-allow allow)
(orig-deny deny)
(wrapper
(lambda (action)
(lambda args (apply action (apply inject-filter args))))))
(set! allow (wrapper orig-allow))
(set! deny (wrapper orig-deny))
,@rules
(set! deny orig-deny)
(set! allow orig-allow))))
;; FIXME should be removed when <rdar://problem/30498072> is fixed.
(allow network*
(local udp)
(remote udp)
(local tcp)
(remote tcp))
;; For reporting progress for active downloads <rdar://problem/44405661>
(allow mach-lookup
(global-name "com.apple.ProgressReporting"))
;; Needed for TCC.
(allow mach-lookup
(global-name "com.apple.tccd"))
(allow file-read* file-write*
(home-subpath "/Library/HTTPStorages"))