{{tag>Brouillon Linux}}
= Notes Linux capabilities sécurité caps capsh setcap
Voir :
* [[http://connect.ed-diamond.com/GNU-Linux-Magazine/GLMF-164/Les-capabilities-sous-Linux|Les capabilities sous Linux]]
* [[https://linuxfr.org/news/linux-capabilities-se-passer-des-commandes-su-et-sudo|Linux capabilities : se passer des commandes su et sudo]]
man 7 capabilities
capsh --print
getpcaps $$
$ dpkg -L libcap-ng-utils |grep 'bin/'
/usr/bin/captest
/usr/bin/filecap
/usr/bin/netcap
/usr/bin/pscap
Voir :
* [[Serveur en écoute sur un port inférieur à 1024 sans utiliser root ni setuid grâce aux capabilities setcap]]
== tcpdump permission pour non-root
Autoriser les utilisateur non-root à utiliser tcpdump
NOTE : il est aussi possible d'utiliser le sudoer
Source : https://askubuntu.com/questions/530920/tcpdump-permissions-problem
Add a capture group and add yourself to it:
sudo groupadd pcap
sudo usermod -a -G pcap $USER
Next, change the group of tcpdump and set permissions:
sudo chgrp pcap /usr/sbin/tcpdump
sudo chmod 750 /usr/sbin/tcpdump
Finally, use setcap to give tcpdump the necessary permissions:
sudo setcap cap_net_raw,cap_net_admin=eip /usr/sbin/tcpdump
Be careful, that this will allow everybody from the group pcap to manipulate network interfaces and read raw packets!
== SyncThing - syncOwnership
Source : https://docs.syncthing.net/advanced/folder-sync-ownership
sudo chown root /usr/local/bin/syncthing
sudo chmod 755 /usr/local/bin/syncthing
sudo setcap CAP_CHOWN,CAP_FOWNER=pe /usr/local/bin/syncthing
== Autres
nerdctl run -ti --rm --cap-drop=all docker.io/jess/amicontained /bin/sh
crictl inspect 6142ce06b10d6