This is already done by using fs/elf/process capabilities. You can
restrict changing immutable flags either by removing CAP_LINUX_IMMUTABLE
capability and giving it only to console owned processes, or to use ELF
headers or filesystem capability storing mechanism... Also, when the
kernel has securebits SECURE_NOROOT increased (securelevel >0 on 2.0
kernels), nobody can change immutable flags. I've been porting my system
to non-root environment and I could run non-suid programs on non-root
environment that require certain privileges - raw net interfaces,
overriding access lists etc, and it is a possibility to see full non-root
system in future :-) Now it is easier with 2.0 kernels, as programs still
are not fully supporting linux capabilities. So, if you are using it, just
increase securelevel... good luck!
With respect,
Domas Mituzas
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/