[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <loom.20140915T145605-849@post.gmane.org>
Date: Mon, 15 Sep 2014 13:07:03 +0000 (UTC)
From: Aleksei Besogonov <alex.besogonov@...il.com>
To: linux-kernel@...r.kernel.org
Subject: Run a script with cap_net_bind_service - mission impossible.
Hi!
It seems that it's totally impossible to start a script with
cap_net_bind_service capability and as a non-root user without modifying
system-wide settings.
I've trawled the Net for a solution that should be exceedingly simple. I
want to run a daemon under a non-privileged account AND allow it to bind to
'secure' ports (443, 589 and 53). So far I found the following non-solutions:
- Use iptables to redirect ports. Doesn't work with local traffic.
- Use an HTTP proxy server (yeah, and also a DNS proxy server).
- Set cap_net_bind_service capability bit on the script interpreter (so
it'll break during upgrades).
- Fuck you, run it under the root user. With several permutations like:
* Dropping caps after opening sockets (can't do this)
* Dropping all caps before starting the interpreter (fucks up the file
ownership)
I've tried without any luck various permutations of capsh like: capsh
--keep=1 --secbits=5 --user=cyberax --caps=cap_net_bind_service+eip -- -c
'nc -l 443'
So is it possible at all?
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists