From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Serge E. Hallyn" Subject: Re: [PATCH 3/4] AUDIT: audit when fcaps increase the permitted or inheritable capabilities Date: Tue, 21 Oct 2008 14:16:25 -0500 Message-ID: <20081021191625.GA4657@us.ibm.com> References: <20081020222538.3895.50175.stgit@paris.rdu.redhat.com> <20081020222612.3895.6710.stgit@paris.rdu.redhat.com> <48FD6E49.6060104@kernel.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Content-Disposition: inline In-Reply-To: <48FD6E49.6060104@kernel.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: "Andrew G. Morgan" Cc: linux-audit@redhat.com, linux-kernel@vger.kernel.org, viro@zeniv.linux.org.ok.redhat.com List-Id: linux-audit@redhat.com Quoting Andrew G. Morgan (morgan@kernel.org): > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Eric Paris wrote: > > Any time fcaps are used to increase a processes pP or pE we will crate a new > > audit record which contains the entire set of known information about the > > executable in question, fP, fI, fE, version and includes the parent processes > > pE, pI, pP. This record type will only be emitted from execve syscalls. > > I'm confused by the choice of when to log this event. > > File capabilities are required to give a process 'any' active > capabilities. That is they don't affect pI -> pI', but without fI or fP, > the post-execve() process is guaranteed to have no pP or pE capabilities. > > Logging execve()s where there is only an increase in capabilities seems > wrong to me. To me it seems equally important to log any event where an > execve() yields pP != 0. True. ... except if (!issecure(SECURE_NOROOT) && uid==0) I guess? And then it also might be interesting in the case where (!issecure(SECURE_NOROOT) && uid==0) and pP is not full. > > diff --git a/security/commoncap.c b/security/commoncap.c > > index 888b292..9bb285d 100644 > > --- a/security/commoncap.c > > +++ b/security/commoncap.c > > @@ -8,6 +8,7 @@ > > */ > > > > #include > > +#include > > #include > > #include > > #include > > @@ -320,6 +321,8 @@ static int get_file_caps(struct linux_binprm *bprm) > > > > rc = bprm_caps_from_vfs_caps(&vcaps, bprm); > > > > + audit_log_bprm_fcaps(bprm, &vcaps); > > + > > When rc != 0, the execve() will fail. Is it appropriate to log in this case? It might fail because fP contains bits not in pP', right? That's probably interesting to auditors. -serge