Re: Ke: Process Capabilities on 2.2.16, Sendmail problem revisited

From: Albert D. Cahalan (acahalan@cs.uml.edu)
Date: Thu Jun 15 2000 - 16:39:59 EST


Jesse I Pollard, II writes:
> Pavel Machek <pavel@suse.cz>:

>>> If MAC override is in some piece of junk like elfcap then
>>> I have no audit control to determine if it is there.
>>
>> Why? You have a tool that parses elf headers and tells you if
>> elfcap header is active. Is that what was your concern? It takes
>> "lot of time" to get elfcap header, but it can be done.
>
> Because the audit "lot of time" doesn't include tar files which can
> contain these things too. Capabilities should not be in tar files.

Ha, ha, ha. ROTFL!!!

So, if tar is made capability bit aware, your system is broken?
Any tool that can try to restore privileged bits is a hole????

Don't give me crap about tar not being able to set the bits
either, because tar can't make a setuid-root file unless the
user and/or tar executable has the required privileges.
Oh, BTW, writes to a setuid file clear the setuid bit unless
the process has appropriate privileges.

Given the horrid logic here, it is obvious that you are trolling.
Please do not troll on linux-kernel.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Thu Jun 15 2000 - 21:00:36 EST