add cap_net_bind_service capability 32/194432/1 accepted/tizen/unified/20181205.063340 submit/tizen/20181204.101028
authorsaerome kim <saerome.kim@samsung.com>
Tue, 4 Dec 2018 09:54:53 +0000 (18:54 +0900)
committersaerome kim <saerome.kim@samsung.com>
Tue, 4 Dec 2018 10:04:51 +0000 (19:04 +0900)
- 'Permitted' capability can make a process can call
system-call without the process's inherited capabilties.
So, security team would like to remove 'Permitted' capabilty.

This change is to remove 'Permitted' capability from hostapd.
To make this, Caller (i.e., wmeshd) should have tue same capabilities as
hostapd. Therefore we set wmeshd's capabilties to match hostapd.

Change-Id: Ifa13538064b9adcb26761f4b164496f8d0027db6
Signed-off-by: saerome kim <saerome.kim@samsung.com>
packaging/wifi-mesh-manager.spec
packaging/wmeshd.service

index 9b4e653..b451ff7 100644 (file)
@@ -2,7 +2,7 @@
 
 Name:          wifi-mesh-manager
 Summary:       Wi-Fi mesh network daemon
-Version:       0.0.5
+Version:       0.0.6
 Release:       1
 Group:      Network & Connectivity/Wireless
 License:    Apache-2.0
index a6b044b..ab16ddb 100644 (file)
@@ -11,5 +11,5 @@ BusName=net.wmesh.manager
 SmackProcessLabel=System
 ExecStart=/usr/bin/wmeshd
 CapabilityBoundingSet=~CAP_MAC_ADMIN
-Capabilities=cap_net_admin,cap_net_raw,cap_dac_override=i
+Capabilities=cap_net_admin,cap_net_raw,cap_dac_override,cap_net_bind_service=i
 SecureBits=keep-caps