From: Balazs Scheidler <bazsi@balabit.hu>
To: "Maciej Żenczykowski" <zenczykowski@gmail.com>
Cc: "Maciej Żenczykowski" <maze@google.com>, netdev@vger.kernel.org
Subject: Re: [PATCH] net: change capability used by socket options IP{,V6}_TRANSPARENT
Date: Tue, 13 Sep 2011 17:27:09 +0200 [thread overview]
Message-ID: <1315927629.5851.4.camel@bzorp> (raw)
In-Reply-To: <1314990654-32252-1-git-send-email-zenczykowski@gmail.com>
On Fri, 2011-09-02 at 12:10 -0700, Maciej Żenczykowski wrote:
> From: Maciej Żenczykowski <maze@google.com>
>
> Up till now the IP{,V6}_TRANSPARENT socket options (which actually set
> the same bit in the socket struct) have required CAP_NET_ADMIN
> privileges to set or clear the option.
>
> - we make clearing the bit not require any privileges.
> - we deprecate using CAP_NET_ADMIN for this purpose.
> - we introduce a new capability CAP_NET_TRANSPARENT,
> which is tailored to allow setting just this bit.
> - we allow either one of CAP_NET_TRANSPARENT or CAP_NET_RAW
> to set this bit, because raw sockets already effectively
> allow you to emulate socket transparency, and make the
> transition easier for apps not desiring to use a brand
> new capability (because of header file or glibc support)
> - we print a warning (but allow it) if you try to set
> the socket option with CAP_NET_ADMIN privs, but without
> either one of CAP_NET_TRANSPARENT or CAP_NET_RAW.
>
> The reason for introducing a new capability is that while
> transparent sockets are potentially dangerous (and can let you
> spoof your source IP on traffic), they don't normally give you
> the full 'freedom' of eavesdropping and/or spoofing that raw sockets
> give you.
>
> Signed-off-by: Maciej Żenczykowski <maze@google.com>
> CC: Balazs Scheidler <bazsi@balabit.hu>
This is ok for me, as long as the security maintainers allow the
introduction of this new cap.
Thanks for doing this and sorry for the late reply.
Acked-by: Balazs Scheidler <bazsi@balabit.hu>
--
Bazsi
next prev parent reply other threads:[~2011-09-13 15:27 UTC|newest]
Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-08-30 21:45 IP_TRANSPARENT requires CAP_NET_ADMIN - why? Maciej Żenczykowski
2011-09-01 21:25 ` Maciej Żenczykowski
2011-09-02 8:43 ` Balazs Scheidler
2011-09-02 19:10 ` [PATCH] net: change capability used by socket options IP{,V6}_TRANSPARENT Maciej Żenczykowski
2011-09-13 5:55 ` Maciej Żenczykowski
2011-09-13 15:27 ` Balazs Scheidler [this message]
2011-09-14 6:45 ` Maciej Żenczykowski
2011-09-20 19:42 ` David Miller
2011-10-17 22:16 ` Maciej Żenczykowski
2011-10-17 22:19 ` Maciej Żenczykowski
2011-10-19 23:34 ` David Miller
2011-10-20 3:32 ` Maciej Żenczykowski
2011-10-20 4:19 ` David Miller
2011-10-20 4:31 ` Maciej Żenczykowski
2011-10-20 4:34 ` David Miller
2011-10-20 22:10 ` [PATCH] net: allow CAP_NET_RAW to set " Maciej Żenczykowski
2011-10-20 22:22 ` David Miller
2011-09-22 23:29 ` [PATCH] net: change capability used by " Maciej Żenczykowski
2011-09-23 14:45 ` Serge E. Hallyn
2011-09-23 16:36 ` Casey Schaufler
2011-09-23 19:33 ` Maciej Żenczykowski
2011-09-26 16:31 ` Casey Schaufler
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1315927629.5851.4.camel@bzorp \
--to=bazsi@balabit.hu \
--cc=maze@google.com \
--cc=netdev@vger.kernel.org \
--cc=zenczykowski@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).