Linux Capabilities¶
Finit supports Linux capabilities, allowing services to run with minimal required privileges instead of running as root. This significantly improves system security by following the principle of least privilege.
Overview¶
Linux capabilities divide the traditional root privileges into distinct units that can be independently granted to processes. For example, a web server only needs the capability to bind to privileged ports (< 1024), not full root access.
Finit uses the modern IAB (Inheritable, Ambient, Bounding) API from libcap, which is the same approach used by other modern service managers like dinit.
Basic Usage¶
Capabilities are specified using the caps: directive in service configuration:
service [2345] name:nginx \
@www-data:www-data \
caps:^cap_net_bind_service \
/usr/sbin/nginx -g 'daemon off;' \
-- Web server
This example allows nginx to bind to privileged ports (like 80 and 443) while
running as the unprivileged www-data user.
IAB Format¶
The capability string uses the IAB (Inheritable, Ambient, Bounding) format with the following prefixes:
^Ambient (and Inheritable) - Recommended for most use cases- Capabilities survive across
exec()calls - Automatically raised to effective after exec
-
Example:
^cap_net_bind_service -
%Inheritable only - Requires the executed binary to have matching file capabilities
- Less common, more complex setup
-
Example:
%cap_net_admin -
!Bounding - Block capability from bounding set - Prevents the service from ever acquiring this capability
- Useful for security hardening
- Example:
!cap_sys_admin
Multiple capabilities can be specified as a comma-separated list:
Common Use Cases¶
Web Server (Privileged Ports)¶
Allow a web server to bind to ports 80 and 443 without running as root:
service [2345] name:webserver \
@www-data:www-data \
caps:^cap_net_bind_service \
/usr/sbin/nginx -g 'daemon off;'
Network Monitoring (Raw Sockets)¶
Allow packet capture without root privileges:
service [2345] name:tcpdump \
@tcpdump \
caps:^cap_net_raw,^cap_net_admin \
/usr/sbin/tcpdump -i eth0 -w /var/log/capture.pcap
NTP Daemon (System Time)¶
Allow time synchronization without full root:
Available Capabilities¶
Common capabilities include (see man 7 capabilities for the complete list):
cap_chown- Make arbitrary changes to file UIDs and GIDscap_dac_override- Bypass file read, write, and execute permission checkscap_dac_read_search- Bypass file read permission checkscap_fowner- Bypass permission checks on operations that normally require filesystem UIDcap_kill- Bypass permission checks for sending signalscap_net_admin- Perform various network-related operationscap_net_bind_service- Bind to privileged ports (< 1024)cap_net_raw- Use RAW and PACKET socketscap_setgid- Make arbitrary manipulations of process GIDscap_setuid- Make arbitrary manipulations of process UIDscap_sys_admin- Perform system administration operations (very powerful!)cap_sys_module- Load and unload kernel modulescap_sys_nice- Raise process nice value and change schedulingcap_sys_time- Set system clock
Security Best Practices¶
- Use the minimum required capabilities
- Only grant what the service actually needs
-
Don't grant
cap_sys_adminunless absolutely necessary -
Always specify a user
- Always use
@userto drop to a non-root user -
Capabilities work best when combined with user separation
-
Use ambient capabilities (
^) - The
^prefix ensures capabilities survive exec() -
Simpler than setting file capabilities on binaries
-
Block dangerous capabilities
- Use
!to explicitly block capabilities you don't want -
Example:
!cap_sys_admin,!cap_sys_module -
Test with
getpcaps - After starting a service, verify its capabilities:
- Should show only the capabilities you granted
Verification¶
After configuring a service with capabilities, verify it works correctly:
# Start the service
initctl start webserver
# Check the process capabilities
getpcaps $(pidof nginx)
# Should show something like:
# 12345: cap_net_bind_service=eip
# Verify the user
ps -o user,pid,cmd -p $(pidof nginx)
# Should show the service running as the specified user
Requirements¶
- Linux kernel 4.3+ (for ambient capabilities support)
- libcap library installed
- Finit built with
--enable-libcap
Limitations¶
- Capabilities are only applied when both
@userandcaps:are specified - The service must drop to a non-root user for capabilities to be effective
- Some very old binaries may not work correctly with ambient capabilities
- File system capabilities are not managed by Finit (use
setcapfor that)
See Also¶
man 7 capabilities- Linux capabilities overviewman 3 cap_iab- IAB capability API documentationman 8 setcap- Set file capabilitiesman 8 getcap- Query file capabilitiesman 1 capsh- Capability shell wrapper