-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Serge E. Hallyn wrote: > Meanwhile, any chance you would get some time to implement the cap_bset > vs fcaps change you wanted? I'd have to look at my checklist to be > sure, but I think that, a version of this patch, and then somehow > addressing James' request for config-able forward compability of > capabilities may finish off the feature request list (as it currently > stands at least).
There are four things I'd like to do (they were the things not mentioned in item #8 in a long-ago email): 0. fix the implementation of cap_setpcap. It is supposed to mean 'this process can raise capabilities, outside its permitted set, in _its own_ inheritable set'. What is currently implemented is that this capability gives a so-endowed process the ability to alter any/all the capabilities of any/all other processes. I consider this a hack created to overcome the lack of filesystem capabilities support. Now we have filesystem support, we don't need the hack. 1. make cap_bset a per-process thing which, like the inheritable set, is copied unchanged through fork() and exec(). The idea here is that the un*x model naturally contains processes as trees, and bounding such a tree at its root is a more appropriate (you can reason about it) security model for unix than having a global bound like this. 2. replace the global secure-bits with a per-process set. The idea here is that different process trees can operate with root as the super-user, or with capabilities, or both. As with 1, this is a better fit for un*x than a (hard to use) global flag. 3. Get rid of all the 'emulate root with capabilities' support. I've come to believe that this emulation was basically a mistake born of the fact that there was no file-system capability support. I'm not sure how controversial these changes will be. I have started to look at 3, but can look at 1 first if you consider it more urgent. Cheers Andrew -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFGr1rH+bHCR3gb8jsRAqkDAJwL4o6i9I9/6u84F+VbIJmD63zHmwCgja8x m/YoKI6+Xj09wh4eJ7znY4w= =NVBp -----END PGP SIGNATURE----- - To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html