Re: problem with capabilities inheritance and auditing in python

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Feb 9, 2009 at 8:02 AM, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
> On Fri, 2009-02-06 at 15:56 -0600, Xavier Toth wrote:
>> On Thu, Feb 5, 2009 at 12:10 PM, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
>> > On Thu, 2009-02-05 at 11:08 -0600, Xavier Toth wrote:
>> >> I've set the capabilities on a script that runs some python code with
>> >> auditing calls in it but I'm not getting audit records written to the
>> >> audit log. From what I've read I thought the +i would all the
>> >> capability to be inherited across execve but this doesn't appear to be
>> >> the case. Can anyone help me understand what's going wrong here? Is
>> >> there a way in the python code to get the capabilities to see if
>> >> indeed cap_audit_write was inherited?
>> >
>> > Linux doesn't honor setuid on scripts, and file capabilities are
>> > supposed to have the same behavior (they didn't for a while due to an
>> > oversight, but that was corrected).  You need an executable wrapper
>> > program that invokes the script, like:
>> > http://oss.tresys.com/projects/clip/browser/trunk/RHEL5.2/scripts/wrappers/wrapper.c
>> >
>> > --
>> > Stephen Smalley
>> > National Security Agency
>> >
>> >
>>
>> Having used this wrapper code pretty much as is I'm now seeing
>> self:capability dac_override and dac_read_search AVCs. Do I need to do
>> something similar to what newrole does to drop capabilities that I
>> don't need my python script to have after all I'm only trying to give
>> it the ability to audit?
>
> You can just dontaudit those denials if you don't need those
> capabilities.
>
> --
> Stephen Smalley
> National Security Agency
>
>

Unfortunately python doesn't survive the dac_read_search AVC. I also
tried removing the setreuid/setregid calls, doing a setcap
cap_audit_write=ep on the wrapper and not running the wrapper as
setuid but that doesn't work.

Ted

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux