-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Serge E. Hallyn wrote:
> Andrew, James, Stephen, Chris,
> 
> The following is all-but-untested (just compiles with relevant config
> combinations).  But is each of you ok with the following approach for
> handling unknown capabilities?

I'd prefer a version that looks like:

struct vfs_cap_data_v2 {
        __u32 magic_etc;  /* Little endian */
        struct {
                __u32 permitted;    /* Little endian */
                __u32 inheritable;  /* Little endian */
        } data[2];
};


> +config SECURITYFILE_CAPS_STRICT
> +     bool "Refuse to run files with unknown capabilities"
> +     depends on SECURITY_FILE_CAPABILITIES
> +     default y
> +     help
> +       Refuse to run files which have unknown capabilities set
> +       in the security.capability xattr.  This could prevent
> +       running important binaries from an updated distribution
> +       on an older kernel.

But this sort of implies that we know something about the future
capabilities.

So far as I can see there are two types of issue:

 - a new capability comes along - it is needed to run an app
 - an old capability (eg. CAP_SYS_ADMIN) is split into two

In the old kernel how could the 'desired behavior' for the new file
attribute be guessed correctly?

Thanks

Andrew
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGt8R1+bHCR3gb8jsRAu7uAJ90uUlXbRmbm0RioNFSpGYrLDh2SQCg0YEc
49Uj9Vt0suz9ntJIM4CjFYo=
=tVr2
-----END PGP SIGNATURE-----
-
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to