--- Darrel Goeddel <dgoeddel(a)trustedcs.com> wrote:
 Serge E. Hallyn wrote:
 > The attached patch addresses Stephen's comments
 about re-using
 > dummy_capget code and properly checking
 capabilities in
 > selinux_netlink_send.
 > 
 > To review, it 
 > 
 >    1.  adds two new capabilities, CAP_AUDIT_READ
 and CAP_AUDIT_WRITE
 >    ...
 
 It would seem that separate
 CAP_AUDIT_ADMIN/CAP_AUDIT_WRITE capabilities are 
 much more important than having a separate
 CAP_ADMIN_READ capability. 
The POSIX Draft uses CAP_AUDIT_WRITE and
CAP_AUDIT_CONTROL, with the later required for
reading records. Irix does the same. A
capability for reading audit records seperate
from that required to disable their generation,
the logic went, is hardly necessary. 
 The 
 CAP_AUDIT_WRITE capability should only allow a
 process to generate a userspace 
 audit message. 
This is consistant with POSIX.
 I think capability checks should map like this:
 
 AUDIT_GET -> none (possibly CAP_AUDIT_ADMIN)
 AUDIT_SET -> CAP_AUDIT_ADMIN
 AUDIT_LIST -> none (possibly CAP_AUDIT_ADMIN)
 AUDIT_ADD -> CAP_AUDIT_ADMIN
 AUDIT_DEL -> CAP_AUDIT_ADMIN
 AUDIT_USER -> CAP_AUDIT_WRITE
 AUDIT_LOGIN -> CAP_AUDIT_ADMIN
 
 The case of AUDIT_LOGIN has merit for a separate
 CAP_AUDIT_LOGIN capability 
 because this carries much more importance than
 AUDIT_USER, but we really should 
 not have the ability to mess with the rest of the
 configuration.  However, this 
 action is as important to the reliability of the
 audit logs as the configuration 
 of the audit subsystem.  I would prioritize this
 capability above CAP_AUDIT_READ 
 as well. 
The granularity of capabilities should be carefully
policed. Data General had over 330 in DGUX. If it
is at all possible to get by with two, that would be
best.
=====
Casey Schaufler
casey(a)schaufler-ca.com
		
__________________________________ 
Do you Yahoo!? 
Take Yahoo! Mail with you! Get it on your mobile phone. 
http://mobile.yahoo.com/maildemo