Bug 1416087

Summary: [RFE] clockdiff, arping, ping, ping6 use File Capabilities
Product: Red Hat Enterprise Linux 6 Reporter: Pat Riehecky <riehecky>
Component: iputilsAssignee: Jan Synacek <jsynacek>
Status: CLOSED WONTFIX QA Contact: qe-baseos-daemons
Severity: low Docs Contact:
Priority: unspecified    
Version: 6.9CC: csieh, misterbonnie
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-01-25 07:10:13 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Pat Riehecky 2017-01-24 14:52:26 UTC
Description of problem:
Can clockdiff, ping, ping6 be packaged to utilize File Capabilities rather than SUID for their network operations.

Version-Release number of selected component (if applicable):iputils-20071127-21.el6


How reproducible:100%


Steps to Reproduce:
1.arping and clockdiff ship without non-root access on RHEL6 (File Cap used in RHEL7)
2.ping and ping6 are setuid
3.

Actual results:
setuid ping/ping6, non-root can run commands under RHEL7 that are not permitted in RHEL6

Expected results:
Use of File Capabilities rather than SUID.

%attr(0755,root,root) %caps(cap_net_raw=p) %{_sbindir}/clockdiff
%attr(0755,root,root) %caps(cap_net_raw=p) %{_sbindir}/arping
%attr(0755,root,root) %caps(cap_net_raw=p cap_net_admin=p) %{_bindir}/ping

Additional info:
https://fedoraproject.org/wiki/Features/RemoveSETUID

Comment 1 Jan Synacek 2017-01-25 07:10:13 UTC
RHEL6 is in production phase 2 now (https://access.redhat.com/support/policy/updates/errata/), it's too late for such change. Sorry.