On Wed, May 13, 2026 at 06:52:00AM -0600, Jonathan Corbet wrote:
> Willy Tarreau <[email protected]> writes:
> 
> > On Wed, May 13, 2026 at 12:29:34PM +0200, Greg KH wrote:
> >> On Tue, May 12, 2026 at 11:20:51AM -0600, Jonathan Corbet wrote:
> >> > Willy Tarreau <[email protected]> writes:
> 
> >> > > +* **Capability-based protection**:
> >> > > +
> >> > > +  * users not having the ``CAP_SYS_ADMIN`` capability may not alter 
> >> > > the
> >> > > +    kernel's configuration, memory nor state, change other users' 
> >> > > view of the
> >> > > +    file system layout, grant any user capabilities they do not have, 
> >> > > nor
> >> > > +    affect the system's availability (shutdown, reboot, panic, hang, 
> >> > > or making
> >> > > +    the system unresponsive via unbounded resource exhaustion).
> >> > 
> >> > That is pretty demonstrably not true, and will likely elicit challenges
> >> > at some point.  There are a lot of "make me root" capabilities that
> >> > enable users to do all of those things; consider CAP_DAC_OVERRIDE as an
> >> > obvious example.  I think that just about all of the capabilities will
> >> > enable at least one of those things - that's why the capabilities exist
> >> > in the first place.  So I think this needs to be written far more
> >> > generally.
> >> 
> >> You are right, there are more capabilities, but we get bug reports all
> >> the time that basically come down to "a user with CAP_SYS_ADMIN can go
> >> and do..." which are pointless for us to be handling.  Just got one a
> >> few minutes ago, so LLMs are churning this crap out quite frequently.
> >> 
> >> So any rewording of this to prevent us from getting these pointless
> >> reports would be great.
> >
> > Honestly we're seeing this through the angle of a patch that lists a
> > single paragraph but the doc is already becoming quite long. I'm a bit
> > afraid of adding long enumerations, or sentences which do not immediately
> > translate to something recognizable by reporters. Not that it cannot be
> > done, but I think the current situation warrants incremental improvements
> > by fixing what doesn't work well. And indeed most of the capabilities
> > based reports currently revolve around "I already have CAP_{SYS,NET}_ADMIN
> > and ...". That might remain a good start for now.
> 
> I definitely wouldn't argue for making it longer, and enumerating all of
> the make-me-root capabilities would be silly.  I would consider just
> replacing CAP_SYS_ADMIN with "elevated capabilities" or some such.  That
> might rule out legitimate reports where some capability provides an
> access it shouldn't, but I suspect you could live with that :)

I think it could indeed work like this, without denaturating the rest
of the paragraph and having broader coverage. Do you think you could
amend/update it ? I'm not trying to add you any burden, it's just that
it will take me more time before I provide an update :-/

Thanks,
Willy

Reply via email to