From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Serge E. Hallyn" Subject: Re: auditing file based capabilities Date: Mon, 13 Oct 2008 10:42:31 -0500 Message-ID: <20081013154231.GA9175@us.ibm.com> References: <200810130715.43092.sgrubb@redhat.com> <20081013140427.GC21812@us.ibm.com> <200810131121.03554.sgrubb@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Content-Disposition: inline In-Reply-To: <200810131121.03554.sgrubb@redhat.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: Steve Grubb Cc: Linux Audit List-Id: linux-audit@redhat.com Quoting Steve Grubb (sgrubb@redhat.com): > On Monday 13 October 2008 10:04:27 Serge E. Hallyn wrote: > > Except I think setcap should also be audited, so that if a task receives > > some inheritable capabilities, you can tell from the logs when that > > happened and which executable did it. > > > > Do you already have a patch for this? > > Would an audit rule for setxattrs cover the setting? Sorry, I meant capset :) A task changing its capability sets. Particularly if it adds to pI (as login/pam_cap will likely do). -serge