CAP_SYS_ADMIN: the new root
CAP_SYS_ADMIN: the new root
Posted Mar 15, 2012 16:11 UTC (Thu) by Cyberax (✭ supporter ✭, #52523)Parent article: CAP_SYS_ADMIN: the new root
First, in the good old times I could just look at an executable and see if it's a setuid executable. Which means "it may be dangerous, beware".
Right now we have tons of capabilities with quite a lot of them equivalent to root access, which are hidden away in extended attributes. And people somehow think it's a GOOD thing.
Then there's a question of braindead el-dumbo capability inheritance. I have not been able after literally hours of trying to grant my Java program access to restricted ports. Should be easy, right? There definitely should be a program which you can run as root, and which will drop excessive capabilities and set uid to another user. Right? Well, think again.
Posted Mar 19, 2012 20:34 UTC (Mon)
by BenHutchings (subscriber, #37955)
[Link] (2 responses)
Posted Mar 20, 2012 2:07 UTC (Tue)
by Cyberax (✭ supporter ✭, #52523)
[Link] (1 responses)
BTW, I see that Wheeze now supports AppArmor ( http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598408 ).
Some time ago ( http://lwn.net/Articles/459460/ ) I promised to send you a case of beer or a yearly subscription to LWN in that case. So what do you choose? :)
Posted Mar 20, 2012 2:33 UTC (Tue)
by foom (subscriber, #14868)
[Link]
systemd apparently is that program.
CAP_SYS_ADMIN: the new root
CAP_SYS_ADMIN: the new root
CAP_SYS_ADMIN: the new root
