Re: capabilities patch (v 0.1)

2005-08-09 Thread David Wagner
David Madore wrote: >I intend to add a couple of capabilities which are normally available >to all user processes, including capability to exec(), [...] Once you have a mechanism that lets you prevent the untrusted program from exec-ing a setuid/setgid program (such as your bounding set idea), I

Re: capabilities patch (v 0.1)

2005-08-09 Thread Bodo Eggert
On Tue, 9 Aug 2005, Chris Wright wrote: > * Bodo Eggert ([EMAIL PROTECTED]) wrote: > > 1) I wouldn't want an exploited service to gain any privileges, even by > >chaining userspace exploits (e.g. exec sendmail < exploitstring). For > >most services, I'd like CAP_EXEC being unset (but it

Re: capabilities patch (v 0.1)

2005-08-09 Thread Chris Wright
* Bodo Eggert ([EMAIL PROTECTED]) wrote: > 1) I wouldn't want an exploited service to gain any privileges, even by >chaining userspace exploits (e.g. exec sendmail < exploitstring). For >most services, I'd like CAP_EXEC being unset (but it doesn't exist). Don't let it exec things it

Re: capabilities patch (v 0.1)

2005-08-09 Thread David Madore
On Tue, Aug 09, 2005 at 11:36:00PM +0200, Bodo Eggert wrote: > 1) I wouldn't want an exploited service to gain any privileges, even by >chaining userspace exploits (e.g. exec sendmail < exploitstring). For >most services, I'd like CAP_EXEC being unset (but it doesn't exist). I intend to

Re: capabilities patch (v 0.1)

2005-08-09 Thread Bodo Eggert
On Tue, 9 Aug 2005, Chris Wright wrote: > * Bodo Eggert ([EMAIL PROTECTED]) wrote: > > Chris Wright <[EMAIL PROTECTED]> wrote: > > > * David Madore ([EMAIL PROTECTED]) wrote: > > >> * Second, a much more extensive change, the patch introduces a third > > >> set of capabilities for every process,

Re: capabilities patch (v 0.1)

2005-08-09 Thread David Madore
On Tue, Aug 09, 2005 at 01:52:06PM -0700, Chris Wright wrote: > * Bodo Eggert ([EMAIL PROTECTED]) wrote: > > How are you going to tell processes that may exec suid (or set-capability-) > > programs from those that aren't supposed to gain certain capabilities? > > typically you'd expect exec suid

Re: capabilities patch (v 0.1)

2005-08-09 Thread Chris Wright
* Bodo Eggert ([EMAIL PROTECTED]) wrote: > Chris Wright <[EMAIL PROTECTED]> wrote: > > * David Madore ([EMAIL PROTECTED]) wrote: > > >> * Second, a much more extensive change, the patch introduces a third > >> set of capabilities for every process, the "bounding" set. Normally > > > > this is

Re: capabilities patch (v 0.1)

2005-08-09 Thread David Madore
On Tue, Aug 09, 2005 at 04:28:31PM -0400, [EMAIL PROTECTED] wrote: > On Tue, 09 Aug 2005 07:26:21 +0200, David Madore said: > > * Second, a much more extensive change, the patch introduces a third > > set of capabilities for every process, the "bounding" set. Normally > > the bounding set has

Re: capabilities patch (v 0.1)

2005-08-09 Thread David Madore
On Tue, Aug 09, 2005 at 05:37:56AM +, Chris Wright wrote: > * David Madore ([EMAIL PROTECTED]) wrote: > > * Second, a much more extensive change, the patch introduces a third > > set of capabilities for every process, the "bounding" set. Normally > > this is not a good idea. don't add more

Re: capabilities patch (v 0.1)

2005-08-09 Thread Valdis . Kletnieks
On Tue, 09 Aug 2005 07:26:21 +0200, David Madore said: > * Second, a much more extensive change, the patch introduces a third > set of capabilities for every process, the "bounding" set. Normally > the bounding set has every capability in it How is this different in semantics from the existing

Re: capabilities patch (v 0.1)

2005-08-09 Thread Bodo Eggert
Chris Wright <[EMAIL PROTECTED]> wrote: > * David Madore ([EMAIL PROTECTED]) wrote: >> * Second, a much more extensive change, the patch introduces a third >> set of capabilities for every process, the "bounding" set. Normally > > this is not a good idea. don't add more sets. if you really

Re: capabilities patch (v 0.1)

2005-08-09 Thread Bodo Eggert
Chris Wright [EMAIL PROTECTED] wrote: * David Madore ([EMAIL PROTECTED]) wrote: * Second, a much more extensive change, the patch introduces a third set of capabilities for every process, the bounding set. Normally this is not a good idea. don't add more sets. if you really want to work

Re: capabilities patch (v 0.1)

2005-08-09 Thread Valdis . Kletnieks
On Tue, 09 Aug 2005 07:26:21 +0200, David Madore said: * Second, a much more extensive change, the patch introduces a third set of capabilities for every process, the bounding set. Normally the bounding set has every capability in it How is this different in semantics from the existing

Re: capabilities patch (v 0.1)

2005-08-09 Thread David Madore
On Tue, Aug 09, 2005 at 05:37:56AM +, Chris Wright wrote: * David Madore ([EMAIL PROTECTED]) wrote: * Second, a much more extensive change, the patch introduces a third set of capabilities for every process, the bounding set. Normally this is not a good idea. don't add more sets.

Re: capabilities patch (v 0.1)

2005-08-09 Thread David Madore
On Tue, Aug 09, 2005 at 04:28:31PM -0400, [EMAIL PROTECTED] wrote: On Tue, 09 Aug 2005 07:26:21 +0200, David Madore said: * Second, a much more extensive change, the patch introduces a third set of capabilities for every process, the bounding set. Normally the bounding set has every

Re: capabilities patch (v 0.1)

2005-08-09 Thread Chris Wright
* Bodo Eggert ([EMAIL PROTECTED]) wrote: Chris Wright [EMAIL PROTECTED] wrote: * David Madore ([EMAIL PROTECTED]) wrote: * Second, a much more extensive change, the patch introduces a third set of capabilities for every process, the bounding set. Normally this is not a good idea.

Re: capabilities patch (v 0.1)

2005-08-09 Thread David Madore
On Tue, Aug 09, 2005 at 01:52:06PM -0700, Chris Wright wrote: * Bodo Eggert ([EMAIL PROTECTED]) wrote: How are you going to tell processes that may exec suid (or set-capability-) programs from those that aren't supposed to gain certain capabilities? typically you'd expect exec suid will

Re: capabilities patch (v 0.1)

2005-08-09 Thread Bodo Eggert
On Tue, 9 Aug 2005, Chris Wright wrote: * Bodo Eggert ([EMAIL PROTECTED]) wrote: Chris Wright [EMAIL PROTECTED] wrote: * David Madore ([EMAIL PROTECTED]) wrote: * Second, a much more extensive change, the patch introduces a third set of capabilities for every process, the bounding

Re: capabilities patch (v 0.1)

2005-08-09 Thread David Madore
On Tue, Aug 09, 2005 at 11:36:00PM +0200, Bodo Eggert wrote: 1) I wouldn't want an exploited service to gain any privileges, even by chaining userspace exploits (e.g. exec sendmail exploitstring). For most services, I'd like CAP_EXEC being unset (but it doesn't exist). I intend to add

Re: capabilities patch (v 0.1)

2005-08-09 Thread Chris Wright
* Bodo Eggert ([EMAIL PROTECTED]) wrote: 1) I wouldn't want an exploited service to gain any privileges, even by chaining userspace exploits (e.g. exec sendmail exploitstring). For most services, I'd like CAP_EXEC being unset (but it doesn't exist). Don't let it exec things it

Re: capabilities patch (v 0.1)

2005-08-09 Thread Bodo Eggert
On Tue, 9 Aug 2005, Chris Wright wrote: * Bodo Eggert ([EMAIL PROTECTED]) wrote: 1) I wouldn't want an exploited service to gain any privileges, even by chaining userspace exploits (e.g. exec sendmail exploitstring). For most services, I'd like CAP_EXEC being unset (but it doesn't

Re: capabilities patch (v 0.1)

2005-08-09 Thread David Wagner
David Madore wrote: I intend to add a couple of capabilities which are normally available to all user processes, including capability to exec(), [...] Once you have a mechanism that lets you prevent the untrusted program from exec-ing a setuid/setgid program (such as your bounding set idea), I

Re: capabilities patch (v 0.1)

2005-08-08 Thread Chris Wright
* David Madore ([EMAIL PROTECTED]) wrote: > * Second, a much more extensive change, the patch introduces a third > set of capabilities for every process, the "bounding" set. Normally this is not a good idea. don't add more sets. if you really want to work on this i'll give you all the patches

capabilities patch (v 0.1)

2005-08-08 Thread David Madore
Well, I wasn't sleepy tonight, so I produced the following patch for Linux capabilities, which attempts to make them useful. It is supposed to do the following (which may or may not conform with the POSIX semantics, I don't think it matters much): * First, and most importantly, capabilities are

capabilities patch (v 0.1)

2005-08-08 Thread David Madore
Well, I wasn't sleepy tonight, so I produced the following patch for Linux capabilities, which attempts to make them useful. It is supposed to do the following (which may or may not conform with the POSIX semantics, I don't think it matters much): * First, and most importantly, capabilities are

Re: capabilities patch (v 0.1)

2005-08-08 Thread Chris Wright
* David Madore ([EMAIL PROTECTED]) wrote: * Second, a much more extensive change, the patch introduces a third set of capabilities for every process, the bounding set. Normally this is not a good idea. don't add more sets. if you really want to work on this i'll give you all the patches that