Unix blocks port 1 - 1024 for non root users. Running a Smalltalk
image as root is obviously a very bad idea, especially when used for
web services. Smalltalk is full of security holes (for example Object
class>>#readFrom: uses the compiler) that would allow a smart person
to gain root rights. It is always good idea to run anything that is
publicly reachable in some sort of a sandbox, even if this is just by
using a non-privileged user.
Hi Lukas,
I read the thread you mentioned. Isn't it feasible to make the port 80
accessible for a non-root process?
This is probably hardcoded in the kernel, but since this problem has
been around for years in most communities, but not to fix this in the
kernel?
Just a very naive question :-)
Cheers,
Alexandre
--
_,.;:~^~:;._,.;:~^~:;._,.;:~^~:;._,.;:~^~:;._,.;:
Alexandre Bergel http://www.bergel.eu
^~:;._,.;:~^~:;._,.;:~^~:;._,.;:~^~:;._,.;:~^~:;.
_______________________________________________
Pharo-project mailing list
Pharo-project@lists.gforge.inria.fr
http://lists.gforge.inria.fr/cgi-bin/mailman/listinfo/pharo-project