diff options
author | cjc <cjc@FreeBSD.org> | 2003-02-21 05:28:27 +0000 |
---|---|---|
committer | cjc <cjc@FreeBSD.org> | 2003-02-21 05:28:27 +0000 |
commit | f66a29b519183414fcd71d2fcc007723367a37bf (patch) | |
tree | 0ecbc12a9a596aa5942c38f7c22394f8acf7e07e /sbin/reboot | |
parent | 5fcbca2516ee0c9809ce27855893710a96fc2fca (diff) | |
download | FreeBSD-src-f66a29b519183414fcd71d2fcc007723367a37bf.zip FreeBSD-src-f66a29b519183414fcd71d2fcc007723367a37bf.tar.gz |
The ancient and outdated concept of "privileged ports" in UNIX-type
OSes has probably caused more problems than it ever solved. Allow the
user to retire the old behavior by specifying their own privileged
range with,
net.inet.ip.portrange.reservedhigh default = IPPORT_RESERVED - 1
net.inet.ip.portrange.reservedlo default = 0
Now you can run that webserver without ever needing root at all. Or
just imagine, an ftpd that can really drop privileges, rather than
just set the euid, and still do PORT data transfers from 20/tcp.
Two edge cases to note,
# sysctl net.inet.ip.portrange.reservedhigh=0
Opens all ports to everyone, and,
# sysctl net.inet.ip.portrange.reservedhigh=65535
Locks all network activity to root only (which could actually have
been achieved before with ipfw(8), but is somewhat more
complicated).
For those who stick to the old religion that 0-1023 belong to root and
root alone, don't touch the knobs (or even lock them by raising
securelevel(8)), and nothing changes.
Diffstat (limited to 'sbin/reboot')
0 files changed, 0 insertions, 0 deletions