--- Andrew Morgan <[EMAIL PROTECTED]> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Serge E. Hallyn wrote:
> > Meanwhile, any chance you would get some time to implement the cap_bset
> > vs fcaps change you wanted?  I'd have to look at my checklist to be
> > sure, but I think that, a version of this patch, and then somehow
> > addressing James' request for config-able forward compability of
> > capabilities may finish off the feature request list (as it currently
> > stands at least).
> 
> There are four things I'd like to do (they were the things not mentioned
> in item #8 in a long-ago email):
> 
>  0. fix the implementation of cap_setpcap. It is supposed to mean 'this
> process can raise capabilities, outside its permitted set, in _its own_
> inheritable set'. What is currently implemented is that this capability
> gives a so-endowed process the ability to alter any/all the capabilities
> of any/all other processes. I consider this a hack created to overcome
> the lack of filesystem capabilities support. Now we have filesystem
> support, we don't need the hack.

I don't think that limiting it to the inheritable set is necessary.
Otherwise, I agree on all counts.

>  1. make cap_bset a per-process thing which, like the inheritable set,
> is copied unchanged through fork() and exec(). The idea here is that the
> un*x model naturally contains processes as trees, and bounding such a
> tree at its root is a more appropriate (you can reason about it)
> security model for unix than having a global bound like this.

I think this would be a good refinement, but later, after people
start to get used to file based capabilities. 

>  2. replace the global secure-bits with a per-process set. The idea here
> is that different process trees can operate with root as the super-user,
> or with capabilities, or both. As with 1, this is a better fit for un*x
> than a (hard to use) global flag.

This is an idea we toyed with some time ago. It might make some
applications that are stubbornly setuid-root easier to deal with.

>  3. Get rid of all the 'emulate root with capabilities' support. I've
> come to believe that this emulation was basically a mistake born of the
> fact that there was no file-system capability support.

Yup.

> I'm not sure how controversial these changes will be.
> 
> I have started to look at 3, but can look at 1 first if you consider it
> more urgent.

0, 3, 2, 1 if you care about my priorities.


Casey Schaufler
[EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to