Using linux capabilities to drop privileges in python
Project description
https://deescalate.readthedocs.org
Do we really need full root power just to bind a HTTP server to port 80 ?
On Linux, no. With the capabilities system, a process can be given some special rights even if it’s not running under root.
The deescalate module provides a few functions to manipulate capabilities and to drop unneeded rights. This way, your python coded server can be ran as root, but drop everything it does not need as soon as it can.
But dropping capabilities in not the end of the story: if we still run the program as root, some dangerous exploits remain: for example, the program will still be able to access files owned by root (think about crontab). More over, after an execve, the program could again have access to some dropped capabilities.
The “securebits” stop this: after setting the securebits, the program won’t be able to gain full root rights again. Setting a new uid further enhances the protection.
Finally, since Linux kernel 3.5, a process can set the “no_new_privs” setting to ask the kernel not to ever add some rights to the process.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file deescalate-0.1.tar.gz
.
File metadata
- Download URL: deescalate-0.1.tar.gz
- Upload date:
- Size: 228.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | bd4580fd073012b210c8a5c6cb49362c489ee944a3572191eb47f84810709801 |
|
MD5 | c84de70670438386df2ad04954b3f3f6 |
|
BLAKE2b-256 | e67e25ccc6720f92664ef370c40b1185ac222a23063b115a39a86ae17de60d85 |