CAP_NET_ADMIN linux capability #2105
Replies: 3 comments 1 reply
-
That may be the reason. This is not "a serious security danger". This is a capability virtually everything, if not everything on your system has by default.
|
Beta Was this translation helpful? Give feedback.
-
By default everything can read everything on a Linux system. Just because something is default it doesn't mean it's secure. I don't consider safe a daemon that when exploited, can mess up my Netfilter firewall. If I don't need DNSCrypt packets to be prioritized, is it safe to deny this capability, or are there other possible side effects? |
Beta Was this translation helpful? Give feedback.
-
You can set This is far more effective than running the process with root privileges and dropping a handful capabilities. |
Beta Was this translation helpful? Give feedback.
-
On Linux,
dnscrypt-proxy
requires theCAP_NET_ADMIN
capability.This is serious security danger. Quoting from
man capabilities
When the daemon has this capability, it's very dangerous in case a vulnerability is found. Without this capability, an exploit can probably only return false IP addresses for domains. With this capability an exploit can take over network management of the system.
I denied this capability via AppArmor, and
dnscrypt-proxy
works properly even without it. Why is it set when it's not needed?Beta Was this translation helpful? Give feedback.
All reactions