LKML Archive on lore.kernel.org help / color / mirror / Atom feed
From: david@lang.hm To: Gergely Nagy <algernon@balabit.hu> Cc: "Serge E. Hallyn" <serge@hallyn.com>, James Morris <jmorris@namei.org>, Linux Kernel Mailing List <linux-kernel@vger.kernel.org> Subject: Re: CAP_SYSLOG, 2.6.38 and user space Date: Wed, 9 Feb 2011 14:27:01 -0800 (PST) [thread overview] Message-ID: <alpine.DEB.2.00.1102091425040.1472@asgard.lang.hm> (raw) In-Reply-To: <1297289098.13055.74.camel@luthien.mhp> On Wed, 9 Feb 2011, Gergely Nagy wrote: > On Wed, 2011-02-09 at 13:47 -0800, david@lang.hm wrote: >> On Wed, 9 Feb 2011, Gergely Nagy wrote: >> >>> On Wed, 2011-02-09 at 13:34 -0800, david@lang.hm wrote: >>>> On Wed, 9 Feb 2011, Gergely Nagy wrote: >>>> >>>>> On Wed, 2011-02-09 at 21:23 +0000, Serge E. Hallyn wrote: >>>>>> So if that's how we're leaning, then the following patch is much more >>>>>> concise. I'll send this to Linus and any appropriate -stable tomorrow >>>>>> if noone objects. >>>>>> >>>>>> From 5166e114d6a7c508addbadd763322089eb0b02f5 Mon Sep 17 00:00:00 2001 >>>>>> From: Serge Hallyn <serge@hallyn.com> >>>>>> Date: Thu, 3 Feb 2011 09:26:15 -0600 >>>>>> Subject: [PATCH 1/1] cap_syslog: don't refuse cap_sys_admin for now (v2) >>>>>> >>>>>> It'd be nice to do that later, but it's not strictly necessary, >>>>>> and it'll be hard to do without breaking somebody's userspace. >>>>>> >>>>>> Signed-off-by: Serge Hallyn <serge@hallyn.com> >>>>>> --- >>>>>> kernel/printk.c | 14 ++++---------- >>>>>> 1 files changed, 4 insertions(+), 10 deletions(-) >>>>> >>>>> Personally, I'd prefer the sysctl idea in the long run, because >>>>> userspace can easily and automatically adapt to the running kernel then. >>>>> Ie, this patch is fine for 2.6.38, but later on, a sysctl could be >>>>> introduced, that when set (but defaulting to unset, as to not break >>>>> userspace), would make CAP_SYS_ADMIN return -EPERM. That way, syslogds >>>>> could look at the setting, and act accordingly. This would mean that old >>>>> userspace wouldn't break, and upgraded userspace could work on both old >>>>> and new kernels, depending on the setting. Distros or admins could then >>>>> enable the sysctl once they made sure that all neccessary applications >>>>> have been upgraded. >>>> >>>> what is your justification for ever having CAP_SYS_ADMIN return -EPERM? >>>> what's the value in blocking this. >>> >>> Nothing. Come to think of it, the main use of the sysctl would be to >>> detect CAP_SYSLOG support, so that applications can drop CAP_SYS_ADMIN >>> and use CAP_SYSLOG only (which, imo, is a good idea - the less >>> capabilities, the better, and CAP_SYS_ADMIN is quite broad when one only >>> wants CAP_SYSLOG). >>> >>> If there's a better way to allow userspace to easily detect CAP_SYSLOG, >>> I'm all for that. >> >> if userspace wants to detect this, what is wrong with them checking for a >> kernel >= 2.6.38? > > How do I do that, apart from parsing utsname, which I find insultingly > ugly? It might be just me, but I very much prefer feature tests over > version sniffing. > >> realistically, if the upstream applications (which need to work with many >> different versions) just support having CAP_SYS_ADMIN, it would be a very >> minor distro patch to change this to CAP_SYSLOG for a distro release where >> the distro _knows_ that they don't have to support an older kernel. > > That is, indeed, true, and works for distros. But when a software vendor > provides binaries aswell as source, they do have to support older > kernels too. And even if that is possible with CAP_SYS_ADMIN, I'd still > prefer CAP_SYSLOG, if available. > > Thus, being able to easily adapt is something I'm very interested in. If > that's not possible, using CAP_SYS_ADMIN for a long long time still is > the second best option. what's wrong with doing a runtime test at startup that tries to read with CAP_SYS_ADMIN and if you get -EPERM trying again with CAP_SYSLOG? creating an ioctl for something like this seems like it's significantly overcomplicating the issue. > I also wish to place as little burden on distros as possible, so > delegating the decision to them does not appeal to me that much. It's > certainly an option, but I'm sure we can do better than that. but why maintain an ioctl forever for something that nobody should care about in a few years? David Lang
next prev parent reply other threads:[~2011-02-09 22:27 UTC|newest] Thread overview: 27+ messages / expand[flat|nested] mbox.gz Atom feed top 2011-02-03 11:39 CAP_SYSLOG, 2.6.38 and user space Gergely Nagy 2011-02-03 15:13 ` Alan Cox 2011-02-03 15:32 ` Serge E. Hallyn 2011-02-03 15:53 ` Gergely Nagy 2011-02-03 16:51 ` Serge E. Hallyn 2011-02-03 17:07 ` Gergely Nagy 2011-02-04 0:49 ` david 2011-02-04 8:03 ` Marc Koschewski 2011-02-04 8:40 ` Gergely Nagy 2011-02-04 11:08 ` Alan Cox 2011-02-04 16:03 ` Serge E. Hallyn 2011-02-03 15:54 ` Nick Bowler 2011-02-04 16:05 ` Serge E. Hallyn 2011-02-04 16:33 ` Gergely Nagy 2011-02-04 17:15 ` Serge E. Hallyn 2011-02-05 7:05 ` david 2011-02-06 1:18 ` Serge E. Hallyn 2011-02-09 21:23 ` Serge E. Hallyn 2011-02-09 21:28 ` Gergely Nagy 2011-02-09 21:34 ` david 2011-02-09 21:40 ` Gergely Nagy 2011-02-09 21:47 ` david 2011-02-09 22:04 ` Gergely Nagy 2011-02-09 22:27 ` david [this message] 2011-02-09 22:37 ` Gergely Nagy 2011-02-10 14:29 ` Serge E. Hallyn 2011-02-09 19:50 ` Gergely Nagy
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=alpine.DEB.2.00.1102091425040.1472@asgard.lang.hm \ --to=david@lang.hm \ --cc=algernon@balabit.hu \ --cc=jmorris@namei.org \ --cc=linux-kernel@vger.kernel.org \ --cc=serge@hallyn.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).