Skip to main content

Using linux capabilities to drop privileges in python

Project description

https://deescalate.readthedocs.org

Do we really need full root power just to bind a HTTP server to port 80 ?

On Linux, no. With the capabilities system, a process can be given some special rights even if it’s not running under root.

The deescalate module provides a few functions to manipulate capabilities and to drop unneeded rights. This way, your python coded server can be ran as root, but drop everything it does not need as soon as it can.

But dropping capabilities in not the end of the story: if we still run the program as root, some dangerous exploits remain: for example, the program will still be able to access files owned by root (think about crontab). More over, after an execve, the program could again have access to some dropped capabilities.

The “securebits” stop this: after setting the securebits, the program won’t be able to gain full root rights again. Setting a new uid further enhances the protection.

Finally, since Linux kernel 3.5, a process can set the “no_new_privs” setting to ask the kernel not to ever add some rights to the process.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

deescalate-0.1.tar.gz (228.9 kB view hashes)

Uploaded Source

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page