Package: whitelister
Severity: wishlist
Version: 0.4-3

Just a suggestion: Currently, to use unix sockets, the changed-to uid must be
modified and a directory established owned by that user, or the daemon is set
to run as root.

If privileges were dropped _after_ the unix socket was established, then the
socket could be bound successfully and the daemon would still end up as
'nobody'.

Currently the socket will be _unlinked_ before privileges are dropped, and the
.pid file created. So it's only the actual socket creation that's an issue.

I can see that binding to an INET socket might not be desirable behaviour as
root, so maybe this behaviour could differ by socket type?

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable'), (950, 'unstable'), (900, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)

-- 
Paul "TBBle" Hampson, [EMAIL PROTECTED]
8th year CompSci/Asian Studies student, ANU

Shorter .sig for a more eco-friendly paperless office.

Attachment: pgpwTn0p4bJiK.pgp
Description: PGP signature

Reply via email to