Linux Capabilities¶
Finit supports Linux capabilities, allowing services to run with minimal required privileges instead of running as root. This significantly improves system security by following the principle of least privilege.
Overview¶
Linux capabilities divide the traditional root privileges into distinct units that can be independently granted to processes. For example, a web server only needs the capability to bind to privileged ports (< 1024), not full root access.
Finit uses the modern IAB (Inheritable, Ambient, Bounding) API from libcap, which is the same approach used by other modern service managers like dinit.
Basic Usage¶
Capabilities are specified using the caps: directive in service configuration:
service [2345] name:nginx \
@www-data:www-data \
caps:^cap_net_bind_service \
/usr/sbin/nginx -g 'daemon off;' \
-- Web server
This example allows nginx to bind to privileged ports (like 80 and 443) while
running as the unprivileged www-data user.
IAB Format¶
The capability string uses the IAB (Inheritable, Ambient, Bounding) format with the following prefixes:
^Ambient (and Inheritable) - Recommended for most use cases- Capabilities survive across
exec()calls - Automatically raised to effective after exec
-
Example:
^cap_net_bind_service -
%Inheritable only - Requires the executed binary to have matching file capabilities
- Less common, more complex setup
-
Example:
%cap_net_admin -
!Bounding - Block capability from bounding set - Prevents the service from ever acquiring this capability
- Useful for security hardening
- Example:
!cap_sys_admin
Multiple capabilities can be specified as a comma-separated list:
Common Use Cases¶
Web Server (Privileged Ports)¶
Allow a web server to bind to ports 80 and 443 without running as root:
service [2345] name:webserver \
@www-data:www-data \
caps:^cap_net_bind_service \
/usr/sbin/nginx -g 'daemon off;'
Network Monitoring (Raw Sockets)¶
Allow packet capture without root privileges:
service [2345] name:tcpdump \
@tcpdump \
caps:^cap_net_raw,^cap_net_admin \
/usr/sbin/tcpdump -i eth0 -w /var/log/capture.pcap
NTP Daemon (System Time)¶
Allow time synchronization without full root:
Available Capabilities¶
Common capabilities include (see man 7 capabilities for the complete list):
cap_chown- Make arbitrary changes to file UIDs and GIDscap_dac_override- Bypass file read, write, and execute permission checkscap_dac_read_search- Bypass file read permission checkscap_fowner- Bypass permission checks on operations that normally require filesystem UIDcap_kill- Bypass permission checks for sending signalscap_net_admin- Perform various network-related operationscap_net_bind_service- Bind to privileged ports (< 1024)cap_net_raw- Use RAW and PACKET socketscap_setgid- Make arbitrary manipulations of process GIDscap_setuid- Make arbitrary manipulations of process UIDscap_sys_admin- Perform system administration operations (very powerful!)cap_sys_module- Load and unload kernel modulescap_sys_nice- Raise process nice value and change schedulingcap_sys_time- Set system clock
Security Best Practices¶
- Use the minimum required capabilities
- Only grant what the service actually needs
-
Don't grant
cap_sys_adminunless absolutely necessary -
Specify a user (preferably non-root)
- The
@userdirective is required forcaps:to take effect - For ambient capabilities (
^), use a non-root user (not@root) -
Example:
@www-data,@nginx,@tcpdump -
Use ambient capabilities (
^) - The
^prefix ensures capabilities survive exec() -
Simpler than setting file capabilities on binaries
-
Block dangerous capabilities
- Use
!to explicitly block capabilities you don't want -
Example:
!cap_sys_admin,!cap_sys_module -
Test with
getpcaps - After starting a service, verify its capabilities:
- Should show only the capabilities you granted
Verification¶
After configuring a service with capabilities, verify it works correctly:
# Start the service
initctl start webserver
# Check the process capabilities
getpcaps $(pidof nginx)
# Should show something like:
# 12345: cap_net_bind_service=eip
# Verify the user
ps -o user,pid,cmd -p $(pidof nginx)
# Should show the service running as the specified user
Requirements¶
- Linux kernel 4.3+ (for ambient capabilities support)
- libcap library installed
- Finit built with
--enable-libcap
Limitations¶
- The
caps:directive requires@userto be specified for it to take effect - Without
@user, the service runs as root with full capabilities and thecaps:configuration is silently ignored - You can use
@rootwithcaps:, but see below about ambient capabilities - For ambient capabilities (
^, recommended), the user must be non-root - Using
@rootwithcaps:^...will not work effectively, as ambient capabilities are only added to the effective set when euid ≠ 0 - Use inheritable (
%) or bounding (!) capabilities with@rootif needed - Services without
caps:use standard privilege dropping: - Services with
@user(non-root) have no special capabilities - Services without
@userrun as root with full capabilities - Some very old binaries may not work correctly with ambient capabilities
- File system capabilities are not managed by Finit (use
setcapfor that)
See Also¶
- capabilities(7) - Linux capabilities overview
- cap_iab(3) - IAB capability API documentation
- setcap(8) - Set file capabilities
- getcap(8) - Query file capabilities
- capsh(1) - Capability shell wrapper