On 02/06/2013 05:03 PM, Chow Loong Jin wrote:
> On 06/02/2013 16:27, Martin Wuertele wrote:
>> * Shawn <shawnland...@gmail.com> [2013-02-05 18:43]:
>>
>>> socket-activation in systemd _helps_ security in that you can give an
>>> unprivlidged process a listening port under 1024. (using a privileged
>>> configuration file)
>> Privileged vs. unprivileged port is not really a secuitry improvement.
> I think he's referring to allowing processes which require listening to a port
> under 1024 to run without superuser privileges. I believe our implementation 
> on
> Debian (e.g. Apache) is to have the process start as root, start listening, 
> and
> then setuid to an unprivileged user.
>
Which would be the wrong way of doing things / wrong reason
for using root as running user, since you can set the
CAP_NET_BIND_SERVICE capability... (man capabilities ...)

Thomas

P.S: I know this since the nice talk from Luciano last summer at debconf! :)


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51129451.3070...@debian.org

Reply via email to