Skip to content

Conversation

@ca-hu
Copy link
Contributor

@ca-hu ca-hu commented Nov 19, 2025

Allows all domains to do nnp_transition when executing another process.

This is needed for tools that disallow setuid/setgid binaries e.g. https://github.com/thkukuk/account-utils and use NoNewPrivs to accomplish that

default: off

see also: https://www.thkukuk.de/blog/no_new_privs/


RFC

  • main question: is there a reason why NoNewPrivs gets added to systemd daemons manually every time?
  • further explanation: with the account-utils tool all processes that are spawned by some systemd service will also need to be allowed nnp_transition therefor it might be needed to be allowed for all domains (even those which are not having the daemon attribute)

please let me know if there are concerns, thanks :)

@ca-hu ca-hu closed this Nov 19, 2025
@ca-hu ca-hu reopened this Nov 19, 2025
@ca-hu ca-hu changed the title RFC: Introduce domain_no_new_privs boolean (bsc#1253047) Draft: RFC: Introduce domain_no_new_privs boolean (bsc#1253047) Nov 19, 2025
@ca-hu ca-hu changed the title Draft: RFC: Introduce domain_no_new_privs boolean (bsc#1253047) RFC: Introduce domain_no_new_privs boolean (bsc#1253047) Nov 19, 2025
Allows all domains to do nnp_transition when executing
another process.

This is needed for tools that disallow setuid/setgid binaries
e.g. https://github.com/thkukuk/account-utils and use NoNewPrivs
to accomplish that

default: off

see also: https://docs.kernel.org/userspace-api/no_new_privs.html
@ca-hu
Copy link
Contributor Author

ca-hu commented Nov 19, 2025

nevermind, i misunderstood how nnp_transitions are implemented in the kernel, closing

@ca-hu ca-hu closed this Nov 19, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant