On Thu, Feb 07, 2013 at 01:35:13AM +0800, Thomas Goirand wrote: > >>> socket-activation in systemd _helps_ security in that you can give an > >>> unprivlidged process a listening port under 1024. (using a privileged > >>> configuration file) > >> Privileged vs. unprivileged port is not really a secuitry improvement. > > I think he's referring to allowing processes which require listening to a > > port > > under 1024 to run without superuser privileges. I believe our > > implementation on > > Debian (e.g. Apache) is to have the process start as root, start listening, > > and > > then setuid to an unprivileged user. > > > Which would be the wrong way of doing things / wrong reason > for using root as running user, since you can set the > CAP_NET_BIND_SERVICE capability... (man capabilities ...) Do we finally have mechanisms to start processes without root but with elevated capabilities?
-- WBR, wRAR
signature.asc
Description: Digital signature