>       Explicitly copied Seb since he was case owner for libpcap.
>
>   
>> 1. For privileges(5), PRIV_NET_RAWACCESS is least required since snort
>> depends on
>> libpcap which sets NIC to RAW mode in order to monitor the flow of the box.
>> And the "Network Management" profile is necessary. From definition of
>> "net_observability"
>> in priv_names in /etc/security, it says
>> #################################################
>> net_observability
>> Allows a process to access /dev/lo0 and the devices in /dev/ipnet/
>> while not requiring them to need PRIV_NET_RAWACCESS.
>> #################################################
>>
>> But libpcap needs to set NIC to raw, so I think net_rawaccess is
>> required, not net_observability.
>> One note however: snort only read data packets from libpcap, and it
>> doesn't try to encapsulate
>> an IP/TCP/UDP/* packet to send because libpcap doesn't support it.
>>     
>
>       Not to belabor things here:  Should libpcap be fixed so that
>       it only needs net_observibility when reading packets?
>   
Thanks Seb for his answer.
>   
>> 2. About the method context, I think user "root" and group "root" is
>> necessary. As following, please:
>>     
>       
>       Why is that?  Why isn't noaccess:noaccess,
>       privileges=net_raw_access (or net_observibility -- base on Seb's
>       reply) sufficient?
>   
It fully depends on the device operation from libpcap
(open NIC device and set it to promisc mode). I am trying
it with noaccess:noaccess after give it certain auths.
>       P.S.  I don't see a reason for your stop method to have a method
>       context.  It appears to only be doing a :kill.
>   
Thanks, I will remove it.
>   
>>>> Network Management:solaris:cmd:::/usr/bin/snort:privs=net_rawaccess
>>>>         
>>>>        <property_group name='general' type='framework'>
>>>>                <!-- to start stop snortd -->
>>>>                <propval name='action_authorization' type='astring'
>>>>                        value='solaris.smf.manage.snort' />
>>>>        </property_group>
>>>>         
>>>   
>>>       
>>>     Don't you also want a value authorization?  See the SMF policy:
>>>     http://opensolaris.org/os/community/arc/policies/SMF-policy/
>>>       
>> Sorry I was not quite familiar with the SMF, and in my understanding
>> about the SMF-policy after reading, it should be like following:
>>     
>
>       Thus the policy.  Project teams are responsible for following
>       applicable policies -;)
>   
Thanks.
>   
>> ##################################################
>> <property_group name='general' type='framework'>
>> <propval name='action_authorization' type='astring'
>> value='solaris.smf.manage.snort' />
>> <propval name='value_authorization' type='astring'
>> value='solaris.smf.manage.snort' />
>> </property_group>
>> ##################################################
>>
>> In this way, auth_attr should be inserted one item:
>> ##################################################
>> solaris.smf.manage.snort:::Manage Snort Service
>> States::help=ManageSnort.html
>> ##################################################
>>
>> In exec_attr, 1 item should be added.
>> The related exec_attr, auth_attr, snort.xml are in attachment.
>> ##################################################
>> Network Management:solaris:cmd:::/usr/bin/snort:privs=net_rawaccess
>> ##################################################
>>     
>
>       Seem fine modulo the libpcap question.
>   
Thank you very much for your help. :)

Thanks
Jason

Reply via email to