Skip to main content
The 2024 Developer Survey results are live! See the results
23 events
when toggle format what by license comment
Dec 8, 2023 at 15:04 comment added Glen Mazza For those still having problems accessing authbind-configured web servers externally at port 80 or port 443 even with authbind configured, for me it turned out the virtual Ubuntu I was using runs the UFW firewall, and extra commands such as "sudo ufw allow 443/tcp" (and/or 80/tcp) were necessary.
Jan 18, 2023 at 13:15 comment added eglasius @deltaraypart of the point of preventing non root processes binding to low ports is so that a malicious user level process can't race the legit process at boot time and take over the port.
May 10, 2021 at 21:59 comment added Jason C @AndrewKoster nginx is another good option along those lines, if you want to take that style of approach.
Feb 18, 2021 at 14:44 comment added Jason C @deltaray Normally, you'd probably want to create a trusted group then add said user to that group. That simplifies management a lot, and also makes it easier to quickly revoke a user's permissions, especially if it's on multiple ports. It also simplifies application deployment if this is part of an install step.
Feb 18, 2021 at 14:39 comment added deltaray IMPO you really shouldn't be giving access to "all users and groups". Instead, you should pick a trusted user that needs to run this and then chown the /etc/authbind/byport/80 and 443 files by that user and chmod them so that they are executable by that user and no-one else. Otherwise you're increasing your security risk, not decreasing it.
Mar 19, 2020 at 2:42 comment added Andrew Koster Use noob's answer that uses iptables to redirect port traffic. Simplest solution by far, and easy to undo if necessary.
Mar 8, 2020 at 13:51 comment added ctrl-alt-delor @chmike e is not needed, if the program that uses capabilities, is capability aware. That is it is written to use them, and so copies a permitted capability to effective (when needed). e is needed for all legacy programs.
Mar 8, 2020 at 12:44 comment added chmike @ctrl-alt-delor After some tests, I saw that the effective (e) is required, the inherited (i) is not
S Nov 22, 2019 at 0:22 history suggested CommunityBot CC BY-SA 4.0
Looks like authbind got ipv6 support at some point
Nov 22, 2019 at 0:22 review Suggested edits
S Nov 22, 2019 at 0:22
Jun 6, 2019 at 16:31 comment added e-info128 Is not work for virtualbox binary.
Nov 17, 2017 at 15:30 comment added ctrl-alt-delor For authbind, if it work at user level and port, then if you create a new user/group for the app, and make the app suid/sgid then you can synthesise application and port level control.
Nov 17, 2017 at 15:28 comment added ctrl-alt-delor for setcap there is no need to give inherited (i) permissions, and you probably should not. If you are writing an app, then it is better to be capability aware, then there is no need to set effective (e).
May 9, 2017 at 9:09 comment added Pere I have my doubts that chmoding to 777 the byport files is the best idea. I've seen giving permisions ranging from 500 to 744. I would stuck to the most restrictive one that works for you.
Jan 26, 2017 at 5:22 history edited Jason C CC BY-SA 3.0
added 76 characters in body
Jan 25, 2017 at 19:31 comment added Christian Rondeau Something that I had to fiddle with; I was trying to run a sysv service, that runs a ruby executable that uses ruby. You need to give the setcap permission on the version- specific ruby executable, e.g. /usr/bin/ruby1.9.1
Oct 27, 2016 at 22:25 comment added rogerdpack Beware that, with setcap, if you overwrite the executable you grant privileges to (ex: do a rebuild) then it loses its privileged port status and you have to give it privileges again :|
Aug 27, 2016 at 15:55 comment added Jason C @eugene1832 That should be sufficient (and you could also do -e to e.g. disable the capability but still leave it in the permitted set). See kernel.org/pub/linux/libs/security/linux-privs/kernel-2.2/… question #2 for a bit more info about how effective and permitted capabilities are combined. You'd have to make the call based on your situation.
Aug 27, 2016 at 15:49 comment added artis3n To revert the operation in Option 1, would you run the command again using -p intead of +eip?
Apr 23, 2016 at 17:42 comment added matanox Does it really need rwx permission?
Mar 4, 2016 at 15:34 vote accept jww
Mar 21, 2015 at 21:20 history edited Jason C CC BY-SA 3.0
added 31 characters in body
Mar 21, 2015 at 21:12 history answered Jason C CC BY-SA 3.0