public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* drop SECURITY_FILE_CAPABILITIES?
@ 2009-11-10 14:07 Serge E. Hallyn
  2009-11-10 15:28 ` Steve Grubb
  2009-11-10 17:23 ` Kees Cook
  0 siblings, 2 replies; 13+ messages in thread
From: Serge E. Hallyn @ 2009-11-10 14:07 UTC (permalink / raw)
  To: lkml
  Cc: linux-security-module, Andrew Morgan, Steve Grubb, Kees Cook,
	Andreas Gruenbacher, Michael Kerrisk, George Wilson

Hey,

Just a probe to see what people think.  I've seen two cases
in about the last month where software was confounded by
an assumption that prctl(PR_CAPBSET_DROP, CAP_SOMETHING)
would succeed if privileged, but not handling the fact
that SECURITY_FILE_CAPABILITIES=n means you can't do that.

Are we at the point yet where we feel we can get rid of
the SECURITY_FILE_CAPABILITIES=n case?

Note that there is a boot arg no_file_caps which prevents
file capabilities from being used if SECURITY_FILE_CAPABILITIES=y.
I think that's the case most users will care about, whereas the
remaining differences between CONFIG_SECURITY_FILE_CAPABILITIES=y
and =n are that with CONFIG_SECURITY_FILE_CAPABILITIES=y :

	(1) certain security hooks (task_setscheduler, task_setioprio, and
	task_setnice) do capability set comparisions,
	(2) it is possible to drop capabilities from the bounding set,
	(3) it is possible to set per-task securelevels,
	(4) and it is possible to add any capability to your inheritable
	set if you have CAP_SETPCAP.

Does anyone know of cases where CONFIG_SECURITY_FILE_CAPABILITIES=n
is still perceived as useful?

thanks,
-serge

^ permalink raw reply	[flat|nested] 13+ messages in thread

end of thread, other threads:[~2009-11-19 20:27 UTC | newest]

Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-11-10 14:07 drop SECURITY_FILE_CAPABILITIES? Serge E. Hallyn
2009-11-10 15:28 ` Steve Grubb
2009-11-10 15:53   ` Serge E. Hallyn
2009-11-10 17:51     ` Steve Grubb
2009-11-11  0:19       ` Serge E. Hallyn
2009-11-18 16:40         ` Andrew G. Morgan
2009-11-18 17:49           ` Steve Grubb
2009-11-18 18:36             ` Andrew G. Morgan
2009-11-18 19:33               ` Steve Grubb
2009-11-18 19:39                 ` Andrew G. Morgan
2009-11-19 15:35                 ` Andrew G. Morgan
2009-11-19 20:26                   ` Steve Grubb
2009-11-10 17:23 ` Kees Cook

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox