-
Notifications
You must be signed in to change notification settings - Fork 84
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
support new configure script option: --with-security-policy={open,lim…
…ited,secure,web-safe}
- Loading branch information
Cristy
committed
Aug 12, 2023
1 parent
6bc911e
commit ba39057
Showing
12 changed files
with
496 additions
and
8 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,95 @@ | ||
<?xml version="1.0" encoding="UTF-8"?> | ||
<!DOCTYPE policymap [ | ||
<!ELEMENT policymap (policy)*> | ||
<!ATTLIST policymap xmlns CDATA #FIXED ''> | ||
<!ELEMENT policy EMPTY> | ||
<!ATTLIST policy xmlns CDATA #FIXED '' domain NMTOKEN #REQUIRED | ||
name NMTOKEN #IMPLIED pattern CDATA #IMPLIED rights NMTOKEN #IMPLIED | ||
stealth NMTOKEN #IMPLIED value CDATA #IMPLIED> | ||
]> | ||
<!-- | ||
Limited ImageMagick security policy: | ||
The primary objective of the limited security policy is to find a | ||
middle ground between convenience and security. This policy involves the | ||
deactivation of potentially hazardous functionalities, like specific coders | ||
such as SVG or HTTP. Furthermore, it establishes several constraints on | ||
the utilization of resources like memory, storage, and processing duration, | ||
all of which are adjustable. This policy proves advantageous in situations | ||
where there's a need to mitigate the potential threat of handling possibly | ||
malicious or demanding images, all while retaining essential capabilities | ||
for prevalent image formats. | ||
Configure ImageMagick policies: | ||
Domains include system, delegate, coder, filter, path, or resource. | ||
Rights include none, read, write, execute and all. Use | to combine them, | ||
for example: "read | write" to permit read from, or write to, a path. | ||
Use a glob expression as a pattern. | ||
Suppose we do not want users to process MPEG video images: | ||
<policy domain="delegate" rights="none" pattern="mpeg:decode" /> | ||
Here we do not want users reading images from HTTP: | ||
<policy domain="coder" rights="none" pattern="HTTP" /> | ||
The /repository file system is restricted to read only. We use a glob | ||
expression to match all paths that start with /repository: | ||
<policy domain="path" rights="read" pattern="/repository/*" /> | ||
Lets prevent users from executing any image filters: | ||
<policy domain="filter" rights="none" pattern="*" /> | ||
Any large image is cached to disk rather than memory: | ||
<policy domain="resource" name="area" value="1GP"/> | ||
Use the default system font unless overridden by the application: | ||
<policy domain="system" name="font" value="/usr/share/fonts/favorite.ttf"/> | ||
Define arguments for the memory, map, area, width, height and disk resources | ||
with SI prefixes (.e.g 100MB). In addition, resource policies are maximums | ||
for each instance of ImageMagick (e.g. policy memory limit 1GB, -limit 2GB | ||
exceeds policy maximum so memory limit is 1GB). | ||
Rules are processed in order. Here we want to restrict ImageMagick to only | ||
read or write a small subset of proven web-safe image types: | ||
<policy domain="delegate" rights="none" pattern="*" /> | ||
<policy domain="filter" rights="none" pattern="*" /> | ||
<policy domain="coder" rights="none" pattern="*" /> | ||
<policy domain="coder" rights="read|write" pattern="{GIF,JPEG,PNG,WEBP}" /> | ||
--> | ||
<policymap> | ||
<!-- <policy domain="resource" name="temporary-path" value="/tmp"/> --> | ||
<!-- <policy domain="resource" name="memory" value="2GiB"/> --> | ||
<!-- <policy domain="resource" name="map" value="4GiB"/> --> | ||
<!-- <policy domain="resource" name="width" value="10KP"/> --> | ||
<!-- <policy domain="resource" name="height" value="10KP"/> --> | ||
<!-- <policy domain="resource" name="list-length" value="128"/> --> | ||
<!-- <policy domain="resource" name="area" value="100MP"/> --> | ||
<!-- <policy domain="resource" name="disk" value="16EiB"/> --> | ||
<!-- <policy domain="resource" name="file" value="768"/> --> | ||
<!-- <policy domain="resource" name="thread" value="4"/> --> | ||
<!-- <policy domain="resource" name="throttle" value="0"/> --> | ||
<!-- <policy domain="resource" name="time" value="3600"/> --> | ||
<!-- <policy domain="coder" rights="none" pattern="MVG" /> --> | ||
<!-- <policy domain="module" rights="none" pattern="{PS,PDF,XPS}" /> --> | ||
<!-- <policy domain="delegate" rights="none" pattern="HTTPS" /> --> | ||
<!-- <policy domain="path" rights="none" pattern="@*" /> --> | ||
<!-- <policy domain="cache" name="memory-map" value="anonymous"/> --> | ||
<!-- <policy domain="cache" name="synchronize" value="True"/> --> | ||
<!-- <policy domain="cache" name="shared-secret" value="passphrase" stealth="true"/> --> | ||
<!-- <policy domain="system" name="max-memory-request" value="256MiB"/> --> | ||
<!-- <policy domain="cache" name="synchronize" value="true"/> --> | ||
<!-- <policy domain="system" name="shred" value="1"/> --> | ||
<!-- <policy domain="system" name="font" value="/path/to/unicode-font.ttf"/> --> | ||
<policy domain="Undefined" rights="none"/> | ||
</policymap> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,95 @@ | ||
<?xml version="1.0" encoding="UTF-8"?> | ||
<!DOCTYPE policymap [ | ||
<!ELEMENT policymap (policy)*> | ||
<!ATTLIST policymap xmlns CDATA #FIXED ''> | ||
<!ELEMENT policy EMPTY> | ||
<!ATTLIST policy xmlns CDATA #FIXED '' domain NMTOKEN #REQUIRED | ||
name NMTOKEN #IMPLIED pattern CDATA #IMPLIED rights NMTOKEN #IMPLIED | ||
stealth NMTOKEN #IMPLIED value CDATA #IMPLIED> | ||
]> | ||
<!-- | ||
Open ImageMagick security policy: | ||
The default policy for ImageMagick installations is the open security | ||
policy. This policy is designed for usage in secure settings like those | ||
protected by firewalls or within Docker containers. Within this framework, | ||
ImageMagick enjoys broad access to resources and functionalities. This policy | ||
provides convenient and adaptable options for image manipulation. However, | ||
it's important to note that it might present security vulnerabilities in | ||
less regulated conditions. Thus, organizations should thoroughly assess | ||
the appropriateness of the open policy according to their particular use | ||
case and security prerequisites. | ||
Configure ImageMagick policies: | ||
Domains include system, delegate, coder, filter, path, or resource. | ||
Rights include none, read, write, execute and all. Use | to combine them, | ||
for example: "read | write" to permit read from, or write to, a path. | ||
Use a glob expression as a pattern. | ||
Suppose we do not want users to process MPEG video images: | ||
<policy domain="delegate" rights="none" pattern="mpeg:decode" /> | ||
Here we do not want users reading images from HTTP: | ||
<policy domain="coder" rights="none" pattern="HTTP" /> | ||
The /repository file system is restricted to read only. We use a glob | ||
expression to match all paths that start with /repository: | ||
<policy domain="path" rights="read" pattern="/repository/*" /> | ||
Lets prevent users from executing any image filters: | ||
<policy domain="filter" rights="none" pattern="*" /> | ||
Any large image is cached to disk rather than memory: | ||
<policy domain="resource" name="area" value="1GP"/> | ||
Use the default system font unless overridden by the application: | ||
<policy domain="system" name="font" value="/usr/share/fonts/favorite.ttf"/> | ||
Define arguments for the memory, map, area, width, height and disk resources | ||
with SI prefixes (.e.g 100MB). In addition, resource policies are maximums | ||
for each instance of ImageMagick (e.g. policy memory limit 1GB, -limit 2GB | ||
exceeds policy maximum so memory limit is 1GB). | ||
Rules are processed in order. Here we want to restrict ImageMagick to only | ||
read or write a small subset of proven web-safe image types: | ||
<policy domain="delegate" rights="none" pattern="*" /> | ||
<policy domain="filter" rights="none" pattern="*" /> | ||
<policy domain="coder" rights="none" pattern="*" /> | ||
<policy domain="coder" rights="read|write" pattern="{GIF,JPEG,PNG,WEBP}" /> | ||
--> | ||
<policymap> | ||
<!-- <policy domain="resource" name="temporary-path" value="/tmp"/> --> | ||
<!-- <policy domain="resource" name="memory" value="2GiB"/> --> | ||
<!-- <policy domain="resource" name="map" value="4GiB"/> --> | ||
<!-- <policy domain="resource" name="width" value="10KP"/> --> | ||
<!-- <policy domain="resource" name="height" value="10KP"/> --> | ||
<!-- <policy domain="resource" name="list-length" value="128"/> --> | ||
<!-- <policy domain="resource" name="area" value="100MP"/> --> | ||
<!-- <policy domain="resource" name="disk" value="16EiB"/> --> | ||
<!-- <policy domain="resource" name="file" value="768"/> --> | ||
<!-- <policy domain="resource" name="thread" value="4"/> --> | ||
<!-- <policy domain="resource" name="throttle" value="0"/> --> | ||
<!-- <policy domain="resource" name="time" value="3600"/> --> | ||
<!-- <policy domain="coder" rights="none" pattern="MVG" /> --> | ||
<!-- <policy domain="module" rights="none" pattern="{PS,PDF,XPS}" /> --> | ||
<!-- <policy domain="delegate" rights="none" pattern="HTTPS" /> --> | ||
<!-- <policy domain="path" rights="none" pattern="@*" /> --> | ||
<!-- <policy domain="cache" name="memory-map" value="anonymous"/> --> | ||
<!-- <policy domain="cache" name="synchronize" value="True"/> --> | ||
<!-- <policy domain="cache" name="shared-secret" value="passphrase" stealth="true"/> --> | ||
<!-- <policy domain="system" name="max-memory-request" value="256MiB"/> --> | ||
<!-- <policy domain="cache" name="synchronize" value="true"/> --> | ||
<!-- <policy domain="system" name="shred" value="1"/> --> | ||
<!-- <policy domain="system" name="font" value="/path/to/unicode-font.ttf"/> --> | ||
<policy domain="Undefined" rights="none"/> | ||
</policymap> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.