From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andy Lutomirski Subject: Re: [RFC] capabilities: Ambient capabilities Date: Fri, 24 Apr 2015 12:53:47 -0700 Message-ID: References: <20150424175348.GL16377@ubuntumail> <20150424190935.GN16377@ubuntumail> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Return-path: In-Reply-To: <20150424190935.GN16377@ubuntumail> Sender: linux-security-module-owner@vger.kernel.org To: Serge Hallyn Cc: Christoph Lameter , Jarkko Sakkinen , Andrew Lutomirski , Ted Ts'o , Andrew Morton , "Andrew G. Morgan" , Linux API , Mimi Zohar , Michael Kerrisk , Austin S Hemmelgarn , linux-security-module , Aaron Jones , Serge Hallyn , LKML , Markku Savela , Kees Cook , Jonathan Corbet List-Id: linux-api@vger.kernel.org On Fri, Apr 24, 2015 at 12:09 PM, Serge Hallyn wrote: > Quoting Andy Lutomirski (luto@amacapital.net): >> On Fri, Apr 24, 2015 at 10:53 AM, Serge Hallyn wrote: >> > Quoting Christoph Lameter (cl@linux.com): >> >> On Thu, 9 Apr 2015, Christoph Lameter wrote: >> >> >> >> > > I'll submit a new version this week with the securebits. Sorry for the delay. >> >> > Are we going to get a new version? >> >> >> >> Replying to my own here. Cant we simply use the SETPCAP approach as per >> >> the patch I posted? >> > >> > Andy had objections to that, but it seems ok to me. >> > >> >> I object because CAP_SETPCAP is very powerful whereas >> CAP_NET_BIND_SERVICE, for example, isn't. I'm fine with having a >> switch to turn off ambient caps, but requiring the "on" state to give > > Would only really be needed for the initial 'enable ambient caps for this > process tree', though. Once that was set, add/remove'ing caps from the > ambient set wouldn't need to be required. That's sort of what my patch does -- you need CAP_SETPCAP to switch the securebit. But Christoph's patch required it to add caps to the ambient set, right? --Andy