dovecot & cap_net_admin capability
Timo Sirainen
tss at iki.fi
Tue Jun 20 22:20:20 EEST 2017
On 20 Jun 2017, at 14.18, Michal Hlavinka <mhlavink at redhat.com> wrote:
>
> Hi,
>
> we've seen SELinux reports from our users that dovecot tried to use something that needs CAP_NET_ADMIN capability. Before enabling it, we would like to know where it originated from. I've checked the sources, but was not able to find anything that would require this capability. Do you know for what it is used?
Is this something that changed recently? Anyway, no idea. Do they have any more details, like is it even the dovecot master process that causes it? Or does it say which syscall fails?
> CAP_NET_ADMIN
> Perform various network-related operations:
> * interface configuration;
> * administration of IP firewall, masquerading, and accounting;
> * modify routing tables;
> * bind to any address for transparent proxying "IP_TRANSPARENT";
> * set type-of-service (TOS) "IP_TOS"
> * clear driver statistics;
> * set promiscuous mode;
> * enabling multicasting;
> * use setsockopt(2) to set the following socket options: SO_DEBUG, SO_MARK, SO_PRIORITY (for a priority outside the range 0 to 6),SO_RCVBUFFORCE, and SO_SNDBUFFORCE
None of these.
More information about the dovecot
mailing list