Re: Policy about packages and file capabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Mon, Nov 16, 2015 at 07:51:30PM +0100, Damjan Georgievski wrote:
> What's the policy about capabilities for executables in Arch packages?

I _guess_ that capabilities are used to avoid SUID binaries when this is
secure.

> I'm asking since in my setup I'm running wpa_supplicant as the
> 'nobody' user, but I let it keep the NET_ADMIN and NET_RAW
> capabilities (excerpt from the .service file):

Read the caveat here: https://w1.fi/cgit/hostap/plain/wpa_supplicant/README .
Basically, you'll need a special user/group for executing
/usr/bin/wpa_supplicant.

In general, why is this necessary? What kind of attack (besides DoS) is
possible against wpa_supplicant?

Cheers,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
                  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux