Hello list readers,
About a talk at HAR2009, of which the outline can be found here: http://druiloor.punt.nl/?id=469116 (Sunny wether: didn't go to well, shit happens, yada yada yada). Anyways besides my own stuff i used ntpd and named as examples. Of which the first can be linked against libcap, as described by slackamp here: http://www.linuxquestions.org/questions/slackware-14/run-ntpd-as-non-root-617019/ (Or last i tried, at least). BIND named can be started with '-u <user>' as described in its rc file. One thing not to overlook might be group access to /etc/rndc.key there. Otherwise chroot them . Or maybe wrap 'm. PAM and redesign roots access rights, whatever. Unless u trust those daemons to never have a 0-day. One thing libcap-ng can be used for is to easily check for cap-bits set on running processes (a build-script for that package is attached). Looking up the filesystem bits maybe a bit harder, cfengine/puppet/etc should be able to support it (probably with external scripts currently). Besides libcap-ng, some interesting stuff is available here: http://www.friedhoff.org/downloads.html (Note capable_probe.tar.bz2 needs kernel probes enabled). Hope this helps, take care, -Menno.
libcap-ng.tar.gz
Description: Binary data
_______________________________________________ SlackBuilds-users mailing list SlackBuilds-users@slackbuilds.org http://lists.slackbuilds.org/mailman/listinfo/slackbuilds-users Archives - http://lists.slackbuilds.org/pipermail/slackbuilds-users/ FAQ - http://slackbuilds.org/faq/