* Stephen Smalley (sds(a)epoch.ncsc.mil) wrote:
On Wed, 2005-02-09 at 09:50, Serge Hallyn wrote:
> CAP_AUDIT_WRITE is needed, but not CAP_AUDIT_CONTROL, which is needed to
> set the loginuid. Of course, an LSM could check at
> security_netlink_send whether the login_uid in the payload is the same
> as the real loginuid. Otherwise, we're wasting a (very precious)
> capability bit.
>
> In either case, have we decided we don't want it in the netlink
> credentials after all?
If the audit subsystem truly needs to include the loginuid in audit
messages generated upon processing netlink messages, then I think it
belongs in the control buffer as per your patch. Alexey has confirmed
that we cannot use the current task's audit context regardless.
As a side bar, a similar security field in the control buffer would
likewise be very useful so that SELinux could set the SID for use in
permission checks by receive functions.
This means sendmsg hook would set the SID? And in that case, you'd
stomp on loginuid for audit messages unless they are special cased.
The loginuid is special case to audit, it doesn't make sense to me that
it is in generic netlink_skb_parms structure unless it's used by more
netlink users.
thanks,
-chris
--
Linux Security Modules
http://lsm.immunix.org http://lsm.bkbits.net