Re: Non-root listening at port < 1024

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2004-11-15 at 10:12, Daniel J Walsh wrote:
> No. SELinux is parallel to normal Linux/Unix protections.  So anything 
> that is prevented do
> to Normal Unix protections will be prevented in an SELinux System.  In 
> the future this might
> change.

Note however that you can run a uid 0 process in a particular SELinux
security domain and deny it all capabilities except CAP_NET_BIND_SERVICE
using the SELinux policy, and further use SELinux policy to limit it to
a specific port number or range.  

-- 
Stephen Smalley <sds@xxxxxxxxxxxxxx>
National Security Agency


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux