From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steve Grubb Subject: Re: auditing file based capabilities Date: Mon, 13 Oct 2008 11:21:03 -0400 Message-ID: <200810131121.03554.sgrubb@redhat.com> References: <200810130715.43092.sgrubb@redhat.com> <20081013140427.GC21812@us.ibm.com> Mime-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20081013140427.GC21812@us.ibm.com> Content-Disposition: inline List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: "Serge E. Hallyn" Cc: Linux Audit List-Id: linux-audit@redhat.com On Monday 13 October 2008 10:04:27 Serge E. Hallyn wrote: > Except I think setcap should also be audited, so that if a task receives > some inheritable capabilities, you can tell from the logs when that > happened and which executable did it. > > Do you already have a patch for this? Would an audit rule for setxattrs cover the setting? -Steve