diff --git a/src/docs/parts/context/context.tex b/src/docs/parts/context/context.tex index e70620b..5e2559f 100644 --- a/src/docs/parts/context/context.tex +++ b/src/docs/parts/context/context.tex @@ -150,31 +150,31 @@ If another process is then moved to this mount-namespace it could automatically \subsubsection{Capabilities} \label{sect:lpc-caps} \Glspl{lxcap} provide a mechanism for fine-grained permission control for \gls{Linux} processes and programs files.\cite{Hallyn2008}. -Conventionally, applications that require elevated privileges are started by \textit{root\footnote{the administrator account on \gls{Linux}}}. -By dropping specific unneeded capabilities, the risk of running an applications that needs some but not all of the \textit{root} privileges can be heavily reduced. +Conventionally, applications that require elevated privileges are set up to run as \textit{root\footnote{the administrator account on \gls{Linux}}} and therefore have \textbf{full} system privileges. +By being able to drop specific unneeded capabilities, the risk in running applications that needs some, but not all, of the \textit{root} privileges can be heavily reduced because. \ctable[ cap = \Glspl{lxcap}, caption = \Glspl{lxcap}\footnote{from \textit{CAPABILITIES(7)}}, maxwidth = \textwidth, label = tab:lxcap, - ]{c}{}{ -\FL CAP\_AUDIT\_CONTROL, CAP\_AUDIT\_READ, CAP\_AUDIT\_WRITE -\NN CAP\_BLOCK\_SUSPEND, CAP\_CHOWN, CAP\_DAC\_OVERRIDE -\NN CAP\_DAC\_READ\_SEARCH, CAP\_FOWNER, CAP\_FSETID -\NN CAP\_IPC\_LOCK, CAP\_IPC\_OWNER, CAP\_KILL -\NN CAP\_LEASE, CAP\_LINUX\_IMMUTABLE, CAP\_MAC\_ADMIN -\NN CAP\_MAC\_OVERRIDE, CAP\_MKNOD, CAP\_NET\_ADMIN -\NN CAP\_NET\_BIND\_SERVICE, CAP\_NET\_BROADCAST, CAP\_NET\_RAW -\NN CAP\_SETGID, CAP\_SETFCAP, CAP\_SETPCAP -\NN CAP\_SETUID, CAP\_SYS\_ADMIN, CAP\_SYS\_BOOT -\NN \textbf{CAP\_SYS\_CHROOT}, CAP\_SYS\_MODULE, CAP\_SYS\_NICE -\NN CAP\_SYS\_PACCT, CAP\_SYS\_PTRACE, CAP\_SYS\_RAWIO -\NN CAP\_SYS\_RESOURCE, CAP\_SYS\_TIME, CAP\_SYS\_TTY\_CONFIG -\NN CAP\_SYSLOG, CAP\_WAKE\_ALARM, CAP\_SETPCAP + ]{X}{}{ +\FL AUDIT\_CONTROL, AUDIT\_READ, AUDIT\_WRITE, +\NN BLOCK\_SUSPEND, CHOWN, DAC\_OVERRIDE, +\NN DAC\_READ\_SEARCH, FOWNER, FSETID +\NN IPC\_LOCK, IPC\_OWNER, KILL +\NN LEASE, LINUX\_IMMUTABLE, MAC\_ADMIN +\NN MAC\_OVERRIDE, MKNOD, NET\_ADMIN +\NN NET\_BIND\_SERVICE, NET\_BROADCAST, NET\_RAW +\NN SETGID, SETFCAP, SETPCAP +\NN SETUID, SYS\_ADMIN, SYS\_BOOT +\NN \textbf{SYS\_CHROOT}, SYS\_MODULE, SYS\_NICE +\NN SYS\_PACCT, SYS\_PTRACE, SYS\_RAWIO +\NN SYS\_RESOURCE, SYS\_TIME, SYS\_TTY\_CONFIG +\NN SYSLOG, WAKE\_ALARM, SETPCAP } -At the time of writing \gls{Linux} the 39 capabilities that are known are listed in table \ref{tab:lxns}. +At the time of writing \gls{Linux} the 39 capabilities that are currently available are listed in table \ref{tab:lxns}. They are listed explicitly for the sake of completeness, and as a demonstration of how many different privileges are distinguished today on \gls{Linux}. As the focus for this project is not \gls{appc} per-se, but only the method of creation and form of distribution, it is not important to examine every listed \gls{lxcap}, but rather look at an interesting example. diff --git a/src/docs/parts/research/research.tex b/src/docs/parts/research/research.tex index 133aab7..a9410f0 100644 --- a/src/docs/parts/research/research.tex +++ b/src/docs/parts/research/research.tex @@ -32,8 +32,10 @@ This chapter explains the criteria for evaluating available \glspl{pm} for their \item [Automatic Updates of Sources] { `guix refresh` can update package sources according to defined updaters } + \item [Native CI] { https://notabug.org/mthl/cuirass } \end{description} + \section{Spack} Spack (\url{https://github.com/LLNL/spack}) is a package manager written in Python.