2 .\" Copyright (c) 2000 Robert N. M. Watson
3 .\" All rights reserved.
5 .\" Redistribution and use in source and binary forms, with or without
6 .\" modification, are permitted provided that the following conditions
8 .\" 1. Redistributions of source code must retain the above copyright
9 .\" notice, this list of conditions and the following disclaimer.
10 .\" 2. Redistributions in binary form must reproduce the above copyright
11 .\" notice, this list of conditions and the following disclaimer in the
12 .\" documentation and/or other materials provided with the distribution.
14 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 .\" $FreeBSD: src/lib/libposix1e/acl.3,v 1.2.2.5 2001/12/20 16:27:06 ru Exp $
27 .\" $DragonFly: src/lib/libposix1e/acl.3,v 1.6 2006/08/19 01:36:39 swildner Exp $
34 .Nd introduction to the POSIX.1e ACL security API
43 permits file systems to export
44 Access Control Lists via the VFS, and provides a library for userland
45 access to and manipulation of these ACLs, but support for ACLs is not
46 provided by any file systems shipped in the base operating system.
47 The library calls shipped with 4.0 include routines to allocate,
48 duplicate, retrieve, set, and validate ACLs associated with file objects.
49 As well as the POSIX.1e routines, there are a number of non-portable
50 extensions defined that allow for alternative ACL semantics than the
51 POSIX.1e semantics, such as AFS, NTFS, and NWFS semantics. Where
52 routines are non-standard, they are suffixed with _np to indicate that
53 they are not portable.
55 POSIX.1e describes a set of ACL manipulation routines to manage the
56 contents of ACLs, as well as their relationships with files. This
57 manipulation library is not currently implemented in
60 a third party library was under development at the time this document
61 was written. There is a general consensus that the POSIX.1e manipulation
62 routines are ambiguously defined in the specification, and don't meet the
63 needs of most applications. For the time being, applications may
64 directly manipulate the ACL structures, defined in
67 recommended usage is to only ever handle text-form ACLs in applications,
68 generated and maintained using
72 passed directly to and from the management routines. In this manner,
73 an application can remain safely unaware of the contents of ACLs.
75 Available functions, sorted by behavior, include:
77 .Fn acl_delete_def_file ,
78 .Fn acl_delete_file_np ,
81 These functions are described in
83 and may be used to delete ACLs from file system objects.
87 This function is described in
89 and may be used to free userland working ACL storage.
93 This function is described in
95 and may be used to convert a text-form ACL into working ACL state, if
96 the ACL has POSIX.1e semantics.
102 These functions are described in
104 and may be used to retrieve ACLs from file system objects.
108 This function is described in
110 and may be used to allocate a fresh (empty) ACL structure.
114 This function is described in
116 and may be used to duplicate an ACL structure.
122 These functions are described in
124 and may be used to assign an ACL to a file system object.
128 This function is described in
130 and may be used to generate a text-form of a POSIX.1e semantics ACL.
133 .Fn acl_valid_file_np ,
136 Thee functions are described in
138 and may be used to validate an ACL as correct POSIX.1e-semantics, or
139 as appropriate for a particular file system object regardless of semantics.
141 Documentation of the internal kernel interfaces backing these calls may
144 The syscalls between the internal interfaces and the public library
145 routines may change over time, and as such are not documented. They are
146 not intended to be called directly without going through the library.
147 .Sh IMPLEMENTATION NOTES
149 support for POSIX.1e interfaces and features is still under
150 development at this time.
152 POSIX.1e assigns security labels to all objects, extending the security
153 functionality described in POSIX.1. These additional labels provide
154 fine-grained discretionary access control, fine-grained capabilities,
155 and labels necessary for mandatory access control. POSIX.2c describes
156 a set of userland utilities for manipulating these labels. These userland
157 utilities are not bundled with
159 so as to discourage their
160 use in the short term.
166 .Xr acl_from_text 3 ,
173 POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
174 of the draft continues on the cross-platform POSIX.1e implementation
175 mailing list. To join this list, see the
177 POSIX.1e implementation
178 page for more information.
180 POSIX.1e support was introduced in
182 and development continues.
184 .An Robert N M Watson
186 These features are not yet fully implemented. In particular, the shipped
187 version of UFS/FFS does not support storage of additional security labels,
188 and so is unable to (easily) provide support for most of these features.