Does the daemon allow dropping privileges? If not, then it will bot be able to bind to a port below 1024.
This option does not seem to be available in dhcpd Cheers Iain Andrew Wood <[email protected]> wrote: >On 28/08/13 01:13, Jerry Stuckle wrote: >> >> Reading through the bug report, it looks like upstream didn't accept >> it. Debian stays as close as possible to upstream, for good reason. >I agree its good to keep things as close as possible to upstream, but >unless upstream can present some compelling argument for why they've >chosen to run it as root, surely this would be a good case to deviate? >Running a network daemon as root is poor security practice and just >plain poor design. > > >-- >To UNSUBSCRIBE, email to [email protected] >with a subject of "unsubscribe". Trouble? Contact >[email protected] >Archive: http://lists.debian.org/[email protected] -- Sent from my Android phone with K-9 Mail. Please excuse my brevity.

