-
Notifications
You must be signed in to change notification settings - Fork 141
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DAC bypass after split security task to secadm user #837
Comments
It looks like the dac_override is not working, or am I missing something ? |
|
Probably worth pointing out that |
@pebenito As you said, this general user # cat /proc/5023/status | grep 'Cap'
CapInh: 0000000000000006
CapPrm: 0000000000000000
CapEff: 0000000000000000
CapBnd: 000001ffffffffff
CapAmb: 0000000000000000 It's possible to add a capability set to all executables used by that user as down below for setcap cap_dac_override=ep /usr/bin/cat |
My goal is to share the management of security policies and selinux-related operation permissions with the secadm user. I created a selinux user named secadm_u and a normal user secadm with the following command:
Because under DAC,
secadm
is a general user, which causes operations likesetenforce
to fail, because the interface files under/sys/fs/selinux
require the write permission of the owner root, for example, thedisable
file can only be written by the owner root,# ll /sys/fs/selinux/disable --w-------. 1 root root 0 Jan 1 1970 /sys/fs/selinux/disable
and the newly created general user cannot pass the DAC check. Is there a more formal solution like this, maybe it only be solved by modifying the owner of
/sys/fs/selinux
?The text was updated successfully, but these errors were encountered: