From: Alexey Tourbin <at@altlinux.ru> To: ALT Devel discussion list <devel@lists.altlinux.org> Subject: Re: [devel] sucap + execcap = ... Date: Tue, 13 Jun 2006 23:22:53 +0400 Message-ID: <20060613192253.GN25291@localhost.localdomain> (raw) In-Reply-To: <20060613153011.GK25291@localhost.localdomain> [-- Attachment #1.1: Type: text/plain, Size: 1375 bytes --] On Tue, Jun 13, 2006 at 07:30:11PM +0400, Alexey Tourbin wrote: > В общем есть типовая задача: рут хочет запускать скрипты > с пониженными привилегями (от псевдопользователя), но с некоторыми > рутовыми capabilities. > suexeccap -u $uid -g $gid -c $cap -- qa-robot -m root@localhost psec /lib /usr/lib Нарисовал то, что хотел нарисовать. Странное дело -- не работает! Я кажется плохо понял, как при exec'е наследуются capabilities. Кто-нибудь может объяснить? $ gcc -Wall suexeccap.c -o suexeccap -lcap $ gcc -Wall test_cap.c -o test_cap -lcap $ sudo ./suexeccap -u nobody -g nobody -c cap_dac_read_search=eip ./test_cap = cap_dac_read_search+i $ То есть я прошу у него "eip", а после exec'а остается только "i". Если я правильно понимаю, то именно из-за этого не работает повышение прав на файловую систему: $ sudo ./suexeccap -u nobody -g nobody -c cap_dac_read_search=eip find /lib |head find: /lib/modules: Permission denied find: /lib: Permission denied /lib /lib/i686 /lib/i686/tls /lib/modules /lib/tls /lib/ld-linux.so.2 /lib/libnss1_dns.so.1 /lib/terminfo /lib/terminfo/E /lib/terminfo/E/Eterm $ sudo ./suexeccap -u nobody -g nobody -c cap_dac_read_search=eip id uid=99(nobody) gid=99(nobody) $ И сразу вопрос ребром: типовая задача, описанная в начале этого письма, может быть решена в принципе? [-- Attachment #1.2: suexeccap.c --] [-- Type: text/plain, Size: 2004 bytes --] #include <stdlib.h> #include <unistd.h> #include <string.h> #include <getopt.h> #include <error.h> #include <sys/types.h> #include <pwd.h> #include <grp.h> #include <sys/capability.h> #include <sys/prctl.h> int main(int argc, char *argv[]) { char *user = NULL, *group = NULL, *capstr = NULL; int c; while ((c = getopt(argc, argv, "+u:g:c:")) >= 0) switch (c) { case 'u': user = optarg; break; case 'g': group = optarg; break; case 'c': capstr = optarg; break; default: return 1; } if (!(user && *user)) error(EXIT_FAILURE, 0, "user not specified"); if (!(group && *group)) error(EXIT_FAILURE, 0, "group not specified"); if (!(capstr && *capstr)) error(EXIT_FAILURE, 0, "capabilities not specified"); if (optind >= argc) error(EXIT_FAILURE, 0, "command not specified"); struct passwd *pw = getpwnam(user); if (!pw) error(EXIT_FAILURE, 0, "getpwnam: user \"%s\" unknown", user); uid_t uid = pw->pw_uid; struct group *gr = getgrnam(group); if (!gr) error(EXIT_FAILURE, 0, "getgrnam: group \"%s\" unknown", group); gid_t gid = gr->gr_gid; cap_t caps = cap_from_text(capstr); if (!caps) error(EXIT_FAILURE, 1, "cap_from_text: \"%s\"", capstr); char suidcapstr[strlen(capstr) + sizeof "cap_setuid,"]; strcpy(suidcapstr, "cap_setuid,"); strcat(suidcapstr, capstr); cap_t suidcaps = cap_from_text(suidcapstr); if (!suidcaps) error(EXIT_FAILURE, 1, "cap_from_text: \"%s\"", suidcapstr); if (setgroups(0, NULL) < 0) error(EXIT_FAILURE, 1, "setgroups"); if (setregid(gid, gid) < 0) error(EXIT_FAILURE, 1, "setregid"); if (prctl(PR_SET_KEEPCAPS, 1) < 0) error(EXIT_FAILURE, 1, "prctl"); if (cap_set_proc(suidcaps) < 0) error(EXIT_FAILURE, 1, "cap_set_proc"); if (setreuid(uid, uid) < 0) error(EXIT_FAILURE, 1, "setreuid"); if (cap_set_proc(caps) < 0) error(EXIT_FAILURE, 1, "cap_set_proc"); execvp(argv[optind], argv + optind); error(EXIT_FAILURE, 1, "execvp: %s", argv[optind]); return EXIT_FAILURE; } [-- Attachment #1.3: test_cap.c --] [-- Type: text/plain, Size: 145 bytes --] #include <stdio.h> #include <sys/capability.h> int main() { cap_t caps = cap_get_proc(); printf("%s\n", cap_to_text(caps, NULL)); return 0; } [-- Attachment #2: Type: application/pgp-signature, Size: 191 bytes --]
next prev parent reply other threads:[~2006-06-13 19:22 UTC|newest] Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top 2006-06-13 10:06 [devel] sucap не работает Alexey Tourbin 2006-06-13 12:13 ` Dmitry V. Levin 2006-06-13 12:52 ` [devel] psec O_NOATIME Alexey Tourbin 2006-06-13 15:25 ` Dmitry V. Levin 2006-06-13 15:47 ` Alexey Tourbin 2006-06-13 15:51 ` Dmitry V. Levin 2006-06-13 16:25 ` Alexey Tourbin 2006-06-13 15:53 ` [devel] O_NOATIME behaviour changed in linux-2.6? Dmitry V. Levin 2006-06-13 16:31 ` Sergey Vlasov 2006-06-13 15:04 ` [devel] sucap не работает Alexey Tourbin 2006-06-13 15:30 ` [devel] sucap + execcap = Alexey Tourbin 2006-06-13 19:22 ` Alexey Tourbin [this message] 2006-06-14 22:12 ` Dmitry V. Levin
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20060613192253.GN25291@localhost.localdomain \ --to=at@altlinux.ru \ --cc=devel@lists.altlinux.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
ALT Linux Team development discussions This inbox may be cloned and mirrored by anyone: git clone --mirror http://lore.altlinux.org/devel/0 devel/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 devel devel/ http://lore.altlinux.org/devel \ devel@altlinux.org devel@altlinux.ru devel@lists.altlinux.org devel@lists.altlinux.ru devel@linux.iplabs.ru mandrake-russian@linuxteam.iplabs.ru sisyphus@linuxteam.iplabs.ru public-inbox-index devel Example config snippet for mirrors. Newsgroup available over NNTP: nntp://lore.altlinux.org/org.altlinux.lists.devel AGPL code for this site: git clone https://public-inbox.org/public-inbox.git