netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* sysfs vs. d80211 configuration
@ 2006-08-14 13:10 Johannes Berg
  2006-08-14 23:05 ` Alexey Toptygin
  0 siblings, 1 reply; 5+ messages in thread
From: Johannes Berg @ 2006-08-14 13:10 UTC (permalink / raw)
  To: netdev; +Cc: greg, linux-kernel

Hey,

In my seemingly never-ending quest to actually use the d80211 stack for 
something useful I just wanted to write a small setuid tool that:
 * creates and opens a new monitor interface
 * drops priviledges
 * ... does things with received frames ... (not interesting for this 
discussion)
 * removes new monitor interface

So I figured I'd just keep an fd open to 
/sys/class/net/mymonitorinterface/remove_iface to which I could write 
the interfaces name after I was done with it. However, when writing to 
that fd I got -EACCESS because it checks for CAP_NET_ADMIN.

That seems to make sense. However, it also means that I can simply not 
write the tool that way, it can't drop priviledges. Of course it could 
re-exec itself with a special parameter to tell it to remove the 
interface, but that'd allow anyone to use it to remove any interface. 
Not good either.

Hence, it seems that in order to properly solve this I should simply add 
a new  sysfs "remove" property for each d80211 virtual interface that 
triggers a removal whenever anything is written to it. And it should not 
have a check for CAP_NET_ADMIN so I can use it after dropping 
priviledges. Sounds great, right? So why isn't there a patch attached to 
this mail?

Well, it isn't too great. See, if you think about it again, removing an 
interface *should* require CAP_NET_ADMIN. But if I want to enable above 
use-case, then I have to check for CAP_NET_ADMIN when *opening* the 
sysfs attribute file, not writing to it. But that doesn't seem possible 
to do. Hence, I lose capability granularity. But it seems that sysfs 
doesn't allow me to do that. [Nor does a configuration system via 
netlink. hmm]

Do I lose? Or put from my kernel developer perspective: should we even 
be enabling such a use?

johannes

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: sysfs vs. d80211 configuration
  2006-08-14 13:10 sysfs vs. d80211 configuration Johannes Berg
@ 2006-08-14 23:05 ` Alexey Toptygin
  2006-08-15  0:07   ` Mike Kershaw
  2006-08-15  7:41   ` Johannes Berg
  0 siblings, 2 replies; 5+ messages in thread
From: Alexey Toptygin @ 2006-08-14 23:05 UTC (permalink / raw)
  To: Johannes Berg; +Cc: netdev

On Mon, 14 Aug 2006, Johannes Berg wrote:

> In my seemingly never-ending quest to actually use the d80211 stack for 
> something useful I just wanted to write a small setuid tool that:
> * creates and opens a new monitor interface
> * drops priviledges
> * ... does things with received frames ... (not interesting for this 
> discussion)
> * removes new monitor interface
>
> So I figured I'd just keep an fd open to 
> /sys/class/net/mymonitorinterface/remove_iface to which I could write the 
> interfaces name after I was done with it. However, when writing to that fd I 
> got -EACCESS because it checks for CAP_NET_ADMIN.

Why not have the tool create a monitor interface, open it, and fork; the 
child drops privileges and does the reading, and the parent wait(2)s for 
the child and removes the interface once it has collected the child?

 			Alexey

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: sysfs vs. d80211 configuration
  2006-08-14 23:05 ` Alexey Toptygin
@ 2006-08-15  0:07   ` Mike Kershaw
  2006-08-15  7:41   ` Johannes Berg
  1 sibling, 0 replies; 5+ messages in thread
From: Mike Kershaw @ 2006-08-15  0:07 UTC (permalink / raw)
  To: Alexey Toptygin; +Cc: Johannes Berg, netdev

[-- Attachment #1: Type: text/plain, Size: 1456 bytes --]

On Mon, Aug 14, 2006 at 11:05:15PM +0000, Alexey Toptygin wrote:
> On Mon, 14 Aug 2006, Johannes Berg wrote:
> 
> >In my seemingly never-ending quest to actually use the d80211 stack for 
> >something useful I just wanted to write a small setuid tool that:
> >* creates and opens a new monitor interface
> >* drops priviledges
> >* ... does things with received frames ... (not interesting for this 
> >discussion)
> >* removes new monitor interface
> >
> >So I figured I'd just keep an fd open to 
> >/sys/class/net/mymonitorinterface/remove_iface to which I could write the 
> >interfaces name after I was done with it. However, when writing to that fd 
> >I got -EACCESS because it checks for CAP_NET_ADMIN.
> 
> Why not have the tool create a monitor interface, open it, and fork; the 
> child drops privileges and does the reading, and the parent wait(2)s for 
> the child and removes the interface once it has collected the child?

Kismet achieves this nearly the same way -- It keeps a root process for
channel control, and talks over IPC to a nonpriv process.  When it's
done, it sends the shutdown command to the root process and restores the
interface settings (or removes monitor interfaces, etc).  

If you set up all your interfaces before the fork you can keep the IPC
very simple.

-m

-- 
Mike Kershaw/Dragorn <dragorn@kismetwireless.net>
GPG Fingerprint: 3546 89DF 3C9D ED80 3381  A661 D7B2 8822 738B BDB1

[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: sysfs vs. d80211 configuration
  2006-08-14 23:05 ` Alexey Toptygin
  2006-08-15  0:07   ` Mike Kershaw
@ 2006-08-15  7:41   ` Johannes Berg
  2006-08-15 10:02     ` Johannes Berg
  1 sibling, 1 reply; 5+ messages in thread
From: Johannes Berg @ 2006-08-15  7:41 UTC (permalink / raw)
  To: Alexey Toptygin; +Cc: netdev

Alexey Toptygin wrote:
> Why not have the tool create a monitor interface, open it, and fork; 
> the child drops privileges and does the reading, and the parent 
> wait(2)s for the child and removes the interface once it has collected 
> the child?
Good point, that'll work. Then again, I want this to run on really tiny 
architectures and I'm thinking some of them might not have fork(), just 
vfork(). Hmm.

johannes

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: sysfs vs. d80211 configuration
  2006-08-15  7:41   ` Johannes Berg
@ 2006-08-15 10:02     ` Johannes Berg
  0 siblings, 0 replies; 5+ messages in thread
From: Johannes Berg @ 2006-08-15 10:02 UTC (permalink / raw)
  To: Johannes Berg; +Cc: Alexey Toptygin, netdev

Johannes Berg wrote:
> Good point, that'll work. Then again, I want this to run on really 
> tiny architectures and I'm thinking some of them might not have 
> fork(), just vfork(). Hmm.
Then again, on those platforms there is no real benefit from dropping 
privs, is there. Heh.

johannes

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2006-08-15 10:02 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-08-14 13:10 sysfs vs. d80211 configuration Johannes Berg
2006-08-14 23:05 ` Alexey Toptygin
2006-08-15  0:07   ` Mike Kershaw
2006-08-15  7:41   ` Johannes Berg
2006-08-15 10:02     ` Johannes Berg

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).