Am 25.07.2013 20:00, schrieb Lennart Poettering:
> On Sat, 20.07.13 04:06, Reindl Harald (h.rei...@thelounge.net) wrote:
> 
>> Hi
>>
>> i try to secure the Apache-Webserver (mpm-prefork) as much as possible
>>
>> am i right that with the following settings in the systemd-unit after the 
>> child-process
>> is forked with the "apache" user and the capabilities are reduced as below 
>> even a
>> potential root exploit would have no success? "SecureBits=noroot" fails i 
>> guess
>> because it even disallows the parent-process to run as root after
>> start
> 
> IIRC combining NoNewPrivileges with CAP_SETUID doesn't really make much
> sense as the latter is one way how to gain new privs, but the former
> doesn't allow this

well, but httpd needs CAP_SETUID to *lower* the privileges after start
for the child-processes and needs root at startup as well as for the
master-prcoess which opens logfiles and othe filehandles not allowed
to do for the user "apache"

that is why my idea of the setting is "OK, once you dropped your privileges
nothing will allow to get back root permissions"

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel

Reply via email to