[arch-general] [arch-dev-public] [signoff] syslog-ng-3.0.1-1
Gerardo Exequiel Pozzi
vmlinuz386 at yahoo.com.ar
Wed Mar 11 03:19:25 EDT 2009
Allan McRae wrote:
> Gerardo Exequiel Pozzi wrote:
>> Pierre Schmitz wrote:
>>
>>> Does anybody know what this message in dmesg is about? Was syslog-ng
>>> compiled for i686?
>>>
>>> warning: `syslog-ng' uses 32-bit capabilities (legacy support in use)
>>>
>>>
>> Very out-of-date libcap, not only syslog-ng, also proftpd, vsftpd,
>> pulseaudio, ntpd, virtualbox, etc, etc...
>>
>> http://www.archlinux.org/packages/extra/i686/libcap/ (for linux 2.4)
>>
>> Need to have libcap2 package for kernel 2.6 in Arch Linux
>> http://www.kernel.org/pub/linux/libs/security/linux-privs/
>>
>
> I was confused about this as libcap is in [extra] so how can it make
> problems with a package in [core]?
>
> So going from this comment in the bug report about libcap
> (http://bugs.archlinux.org/task/11917#comment41046) I get...
>
>> readelf -s /usr/sbin/syslog-ng | grep cap
> 33: 00000000 0 FUNC GLOBAL DEFAULT UND capset at GLIBC_2.1 (4)
> 177: 00000000 0 FUNC GLOBAL DEFAULT UND capget at GLIBC_2.1 (4)
> 473: 08228bd8 4 OBJECT GLOBAL DEFAULT 26 OPENSSL_ia32cap_P
>
> Looks like libcap is a soft dep there. How?
>
> Then rebuild in clean chroot:
>> readelf -s syslog-ng | grep cap
> 467: 08221b18 4 OBJECT GLOBAL DEFAULT 26 OPENSSL_ia32cap_P
>
> And then the dmesg warning goes away... So, the lesson to learn is to
> _always build in a clean chroot_!
>
> Allan
>
Agree about clean chroot.
But maybe this is useful, and more secure syslog-ng setup, because it
drop some capabilities that don't use it ;)
You can see the syslog-ng process running without capabilities enabled
(from /proc/PID/status):
CapPrm: fffffffffffffeff
CapEff: fffffffffffffeff
Capabilities for `27939': =ep cap_setpcap-ep ## getpcaps program from
latest libcap
Shows that have all capabilities, of course, i can't drop it.
But running the syslog-ng, with capabilities enabled (accidentally
enabled now) you can see, many capabilities are droped :)
CapPrm: 0000000000202c06
CapEff: 0000000000200002
Capabilities for `23652': = cap_dac_override,cap_sys_admin+ep
cap_dac_read_search,cap_net_bind_service,cap_net_broadcast,cap_net_raw+p
More secure syslog-ng ;)
OK, this isn't default behavior in Arch Linux, but...
--
Gerardo Exequiel Pozzi ( djgera )
http://www.djgera.com.ar
KeyID: 0x1B8C330D
Key fingerprint = 0CAA D5D4 CD85 4434 A219 76ED 39AB 221B 1B8C 330D
More information about the arch-general
mailing list