Greetings George,
>Sent: Sunday, July 21, 2024 at 4:00 AM >From: "George at Clug" <c...@goproject.info> >To: debian-user@lists.debian.org >Subject: Re: pam and pam-cap don't play along >On Sunday, 21-07-2024 at 07:57 daggs wrote: >> Greetings, >> >> I have bookworm installation where I want to allow a group of users to run a >> specific binary that needs to execute a ioctl which is not possible for >> normal users. >> in comes pam+libcap. >> so I've installed libcap, updated /etc/security/capability.conf with this >> line: cap_net_admin @igor >> then I've moved the bin I've created to /usr/local/bin and defined this in >> /etc/pam.d: >> $ cat /etc/pam.d/test1 >> auth optional pam_cap.so > >$ man auth >No manual entry for auth > >Daggs, > >I do not have the Linux skills to help you, hopefully other do and can help >you. > >I would ask if you could give a bit more detail, it may help others to help >you. > >Is what you are trying to do, related to what this page is about? >https://adil.medium.com/run-your-applications-with-necessary-privileges-linux-capabilities-428e2c402f0b > >George yes, this looks like what I'm trying to do, I'll look into it, thanks for the link. what I need to do is to allow virsh the ability to create tap interfaces when starting a vm in a session scope rather than a system scope. I just tried to minimize the test case. Thanks, Dagg > >https://adil.medium.com/run-your-applications-with-necessary-privileges-linux-capabilities-428e2c402f0b[https://adil.medium.com/run-your-applications-with-necessary-privileges-linux-capabilities-428e2c402f0b] > >https://man7.org/linux/man-pages/man3/libcap.3.html > >https://www.sciencedirect.com/topics/computer-science/libpcap-library >This library is frequently used in network security tools for a variety of >purposes including in network scanners and network monitoring software. > >https://manpages.ubuntu.com/manpages/focal/en/man5/capability.conf.5.html[https://manpages.ubuntu.com/manpages/focal/en/man5/capability.conf.5.html] > If any capability name or numeric value is invalid/unknown to the local >system, the > capabilities will be rejected, and the inheritable set will not be >modified. > >https://unix.stackexchange.com/questions/74607/is-it-possible-to-specify-groups-in-etc-security-capability-conf[https://unix.stackexchange.com/questions/74607/is-it-possible-to-specify-groups-in-etc-security-capability-conf] >my pet project is to replace the setuid on a lot of the binaries and provide >access to additional privileged utilities to non-root users. > >> >> now I'm trying to run test1 as user igor which is in the relevant group: >> $ id igor >> uid=1000(igor) gid=1000(igor) >> groups=1000(igor),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),100(users),106(netdev) >> >> when I run it, I get this error: >> $ test1 >> Unable to create tap device: Operation not permitted >> >> what am I going wrong? >> >> Thanks >> >> Dagg >> >>