Linux Capabilites

Материал из noname.com.ua
Перейти к навигацииПерейти к поиску


POSIX Capabilities
Content:

1.  CAP_CHOWN

Code Listing 1.1: CAP_CHOWN

  CAP_CHOWN
	In a system with the [_POSIX_CHOWN_RESTRICTED] option defined, 
	this overrides the restriction of changing file ownership and 
	group ownership.

2.  CAP_DAC_OVERRIDE

Code Listing 2.1: CAP_DAC_OVERRIDE

  CAP_DAC_OVERRIDE
	Override all DAC access, including ACL execute access 
	if [_POSIX_ACL] is defined. 
	Excluding DAC access covered by CAP_LINUX_IMMUTABLE.

3.  CAP_DAC_READ_SEARCH

Code Listing 3.1: CAP_DAC_READ_SEARCH

  CAP_DAC_READ_SEARCH	
	Overrides all DAC restrictions, regarding read and search on files 
	and directories, including ACL restrictions, if [_POSIX_ACL] is 
	defined. Excluding DAC access covered by CAP_LINUX_IMMUTABLE.

4.  CAP_FOWNER

Code Listing 4.1: CAP_FOWNER

  CAP_FOWNER
	Overrides all restrictions about allowed operations on files, where 
	file owner ID must be equal to the user ID, except where CAP_FSETID 
	is applicable. It doesn't override MAC and DAC restrictions.

5.  CAP_FSETID

Code Listing 5.1: CAP_FSETID

  CAP_FSETID
	Overrides the following restrictions, that the effective user ID shall
	match the file owner ID, when setting the S_ISUID and S_ISGID bits on 
	that file; that the effective group ID (or one of the supplementary 
	group IDs) shall match the file owner ID when setting the S_ISGID bit 
	on that file; that the S_ISUID and S_ISGID bits are cleared on 
	successful return from chown(2) (not implemented).

6.  CAP_FS_MASK

Code Listing 6.1: CAP_FS_MASK

  CAP_FS_MASK
	Used to decide between falling back on the old suser() or fsuser().

7.  CAP_KILL

Code Listing 7.1: CAP_KILL

  CAP_KILL
	Overrides the restriction, that the real or effective user ID of a process,
	sending a signal, must match the real or effective user ID of the process,
	receiving the signal.

8.  CAP_SETGID

Code Listing 8.1: CAP_SETGID

  CAP_SETGID
	Allows setgid(2) manipulation;
	Allows setgroups(2);
	Allows forged gids on socket credentials passing.

9.  CAP_SETUID

Code Listing 9.1: CAP_SETUID

  CAP_SETUID
	Allows set*uid(2) manipulation (including fsuid);
	Allows forged pids on socket credentials passing.

10.  CAP_SETPCAP

Code Listing 10.1: CAP_SETPCAP

  CAP_SETPCAP
	Transfer any capability in your permitted set to any pid, remove any capability in your permitted set from any pid.

11.  CAP_LINUX_IMMUTABLE

Code Listing 11.1: CAP_LINUX_IMMUTABLE

  CAP_LINUX_IMMUTABLE
	Allow modification of S_IMMUTABLE and S_APPEND file attributes.

12.  CAP_NET_BIND_SERVICE

Code Listing 12.1: CAP_NET_BIND_SERVICE

  CAP_NET_BIND_SERVICE
	Allows binding to TCP/UDP sockets below 1024;
	Allows binding to ATM VCIs below 32.

13.  CAP_NET_BROADCAST

Code Listing 13.1: CAP_NET_BROADCAST

  CAP_NET_BROADCAST
	Allow broadcasting, listen to multicast.

14.  CAP_NET_ADMIN

Code Listing 14.1: CAP_NET_ADMIN

  CAP_NET_ADMIN
	Allow interface configuration;
	Allow administration of IP firewall, masquerading and accounting;
	Allow setting debug option on sockets;
	Allow modification of routing tables;
	Allow setting arbitrary process / process group ownership on sockets;
	Allow binding to any address for transparent proxying;
	Allow setting TOS (type of service);
	Allow setting promiscuous mode;
	Allow clearing driver statistics;
	Allow multicasting;
	Allow read/write of devicespecific registers;
	Allow activation of ATM control sockets.

15.  CAP_NET_RAW

Code Listing 15.1: CAP_NET_RAW

  CAP_NET_RAW
	Allow use of RAW sockets;
	Allow use of PACKET sockets.

16.  CAP_IPC_LOCK

Code Listing 16.1: CAP_IPC_LOCK

  CAP_IPC_LOCK
	Allow locking of shared memory segments;
	Allow mlock and mlockall (which doesn't really have anything to do with IPC).

17.  CAP_IPC_OWNER

Code Listing 17.1: CAP_IPC_OWNER

  CAP_IPC_OWNER
	Override IPC ownership checks.

18.  CAP_SYS_MODULE

Code Listing 18.1: CAP_SYS_MODULE

  CAP_SYS_MODULE
	Insert and remove kernel modules  modify kernel without limit;
	Modify cap_bset.

19.  CAP_SYS_RAWIO

Code Listing 19.1: CAP_SYS_RAWIO

  CAP_SYS_RAWIO
	Allow ioperm/iopl access;
	Allow sending USB messages to any device via /proc/bus/usb.

20.  CAP_SYS_CHROOT

Code Listing 20.1: CAP_SYS_CHROOT

  CAP_SYS_CHROOT
	Allow use of chroot().

21.  CAP_SYS_PTRACE

Code Listing 21.1: CAP_SYS_PTRACE

  CAP_SYS_PTRACE
	Allow ptrace() of any process.

22.  CAP_SYS_PACCT

Code Listing 22.1: CAP_SYS_PACCT

  CAP_SYS_PACCT
	Allow configuration of process accounting.

23.  CAP_SYS_ADMIN

Code Listing 23.1: CAP_SYS_ADMIN

  CAP_SYS_ADMIN
	Allow configuration of the secure attention key;
	Allow administration of the random device;
	Allow examination and configuration of disk quotas;
	Allow configuring the kernel's syslog (printk behaviour);
	Allow setting the domainname;
	Allow setting the hostname;
	Allow calling bdflush();
	Allow mount() and umount(), setting up new smb connection;
	Allow some autofs root ioctls;
	Allow nfsservctl; Allow VM86_REQUEST_IRQ;
	Allow to read/write pci config on alpha; Allow irix_prctl on mips (setstacksize);
	Allow flushing all cache on m68k (sys_cacheflush);
	Allow removing semaphores; Used instead of CAP_CHOWN to "chown" IPC message queues, semaphores and shared memory;
	Allow locking/unlocking of shared memory segment;
	Allow turning swap on/off;
	Allow forged pids on socket credentials passing;
	Allow setting readahead and flushing buffers on block devices;
	Allow setting geometry in floppy driver;
	Allow turning DMA on/off in xd driver;
	Allow administration of md devices (mostly the above, but some extra ioctls);
	Allow tuning the ide driver;
	Allow access to the nvram device;
	Allow administration of apm_bios, serial and bttv (TV) device;
	Allow manufacturer commands in isdn CAPI support driver;
	Allow reading nonstandardized portions of pci configuration space;
	Allow DDI debug ioctl on sbpcd driver;
	Allow setting up serial ports;
	Allow sending raw qic117 commands;
	Allow enabling/disabling tagged queuing on SCSI controllers and sending arbitrary SCSI commands;
	Allow setting encryption key on loopback filesystem.

24.  CAP_SYS_BOOT

Code Listing 24.1: CAP_SYS_BOOT

  CAP_SYS_BOOT
	Allow use of reboot().

25.  CAP_SYS_NICE

Code Listing 25.1: CAP_SYS_NICE

  CAP_SYS_NICE
	Allow raising priority and setting priority on other (different UID) processes;
	Allow use of FIFO and roundrobin (realtime) scheduling on own processes and setting 
	the scheduling algorithm used by another process.

26.  CAP_SYS_RESOURCE

Code Listing 26.1: CAP_SYS_RESOURCE

  CAP_SYS_RESOURCE 
	Override resource limits. Set resource limits;
	Override quota limits;
	Override reserved space on ext2 filesystem;
	Modify data journaling mode on ext3 filesystem 
	(uses journaling resources); NOTE: ext2 honors fsuid when checking for
	resource overrides, so you can override using fsuid too;
	Override size restrictions on IPC message queues;
	Allow more than 64hz interrupts from the realtime clock;
	Override max number of consoles on console allocation;
	Override max number of keymaps.

27.  CAP_SYS_TIME

Code Listing 27.1: CAP_SYS_TIME

  CAP_SYS_TIME
	Allow manipulation of system clock;
	Allow irix_stime on mips;
	Allow setting the realtime clock.

28.  CAP_SYS_TTY_CONFIG

Code Listing 28.1: CAP_SYS_TTY_CONFIG

  CAP_SYS_TTY_CONFIG
	Allow configuration of tty devices; Allow vhangup() of tty.

29.  CAP_MKNOD

Code Listing 29.1: CAP_MKNOD

  CAP_MKNOD
	Allow the privileged aspects of mknod().

30.  CAP_LEASE

Code Listing 30.1: CAP_LEASE

  CAP_LEASE
	Allow taking of leases on files.


С целью избавления системы от программ с suid-битом, можно использовать следующую инструкцию.
Для привязки capabilities к исполняемому файлу используется утилита setcap из пакета libcap2-bin:

   sudo apt-get install libcap2-bin

Для формирования списка setuid-root и setgid-root программ можно использовать следующие команды:

   find /bin /sbin /lib /usr/bin /usr/sbin /usr/lib -perm /4000 -user root
   find /bin /sbin /lib /usr/bin /usr/sbin /usr/lib -perm /2000 -group root

Команды для замены setuid/setgid для базовых пакетов:

coreutils

   chmod u-s /bin/su
   setap cap_setgid,cap_setuid+ep /bin/su

dcron

   chmod u-s /usr/bin/crontab
   setcap cap_dac_override,cap_setgid+ep /usr/bin/crontab

inetutils

   chmod u-s /usr/bin/rsh
   setcap cap_net_bind_service+ep /usr/bin/rsh

   chmod u-s /usr/bin/rcp
   setcap cap_net_bind_service+ep /usr/bin/rcp

   chmod u-s /usr/bin/rlogin
   setcap cap_net_bind_service+ep /usr/bin/rlogin

iputils

   chmod u-s /bin/ping
   setcap cap_net_raw+ep /bin/ping

   chmod u-s /bin/ping6
   setcap cap_net_raw+ep /bin/ping6

   chmod u-s /bin/traceroute
   setcap cap_net_raw+ep /bin/traceroute

   chmod u-s /bin/traceroute6
   setcap cap_net_raw+ep /bin/traceroute6

pam

   chmod u-s /sbin/unix_chkpwd
   setcap cap_dac_read_search+ep /sbin/unix_chkpwd

shadow

   chmod u-s /usr/bin/chage
   setcap cap_dac_read_search+ep /usr/bin/chage

   chmod u-s /usr/bin/chfn
   setcap cap_chown,cap_setuid+ep /usr/bin/chfn

   chmod u-s /usr/bin/chsh
   setcap cap_chown,cap_setuid+ep /usr/bin/chsh

   chmod u-s /usr/bin/expiry
   setcap cap_dac_override,cap_setgid+ep /usr/bin/expiry

   chmod u-s /usr/bin/gpasswd
   setcap cap_chown,cap_dac_override,cap_setuid+ep /usr/bin/gpasswd

   chmod u-s /usr/bin/newgrp
   setcap cap_dac_override,cap_setgid+ep /usr/bin/newgrp

   chmod u-s /usr/bin/passwd
   setcap cap_chown,cap_dac_override,cap_fowner+ep /usr/bin/passwd

xorg-xserver

   chmod u-s /usr/bin/Xorg
   setcap cap_chown,cap_dac_override,cap_sys_rawio,cap_sys_admin+ep /usr/bin/Xorg


screen - обязательно требует setuid для выполнения определенных проверок

util-linux-ng - не рекомендуется использовать данный пакет с capabilities, так как в реализации команд mount и umount присутствуют определенные проверки, которые действуют только с setuid и пропускаются с  capabilities, что дает возможность пользователям монтировать файловые системы к которым они не имеют доступа.
Подробнее об опасностях, которые сулит перевод программы с setuid на capabilities без проведения аудита кода, можно прочитать [[http://www.opennet.ru/openforum/vsluhforumID3/71880.html#13 здесь]].

URL: https://wiki.archlinux.org/index.php/Using_File_Capabilities...
Обсуждается: http://www.opennet.ru/tips/info/2469.shtml