On Tue, Jan 14, 2020 at 08:56:50AM +, Peter Palfrader wrote:
> Great. So if you want your service to be able to gain extra privileges,
> you set NoNewPrivileges to false in your local override file.
Thanks for the hint about an override file. That's better than editing
/lib/systemd/system/tor
On Fri, Jun 23, 2017 at 09:57:31AM -0700, David Fifield wrote:
> I've just discovered a ticket in the Tor bug tracker about the same
> issue. The user there had upgraded to 0.2.7.6-1~d80.jessie+1 when the
> problem started occurring.
>
> "obfs4proxy cannot bind to <1024 port with systemd hardened
I've just discovered a ticket in the Tor bug tracker about the same
issue. The user there had upgraded to 0.2.7.6-1~d80.jessie+1 when the
problem started occurring.
"obfs4proxy cannot bind to <1024 port with systemd hardened service unit"
https://bugs.torproject.org/18356
However, the workaround
On Thu, Jun 22, 2017 at 07:30:11AM +, Peter Palfrader wrote:
> On Wed, 21 Jun 2017, David Fifield wrote:
>
> > Package: tor
> > Version: 0.2.9.10-1
> > Severity: normal
> >
> > I'm trying to have a server transport plugin listen on a port <1024. In
> > the past, it has worked to set CAP_NET_B
On Wed, 21 Jun 2017, David Fifield wrote:
> Package: tor
> Version: 0.2.9.10-1
> Severity: normal
>
> I'm trying to have a server transport plugin listen on a port <1024. In
> the past, it has worked to set CAP_NET_BIND_SERVICE on the pluggable
> transport binary (e.g. /usr/bin/obfs4proxy). But t
Package: tor
Version: 0.2.9.10-1
Severity: normal
I'm trying to have a server transport plugin listen on a port <1024. In
the past, it has worked to set CAP_NET_BIND_SERVICE on the pluggable
transport binary (e.g. /usr/bin/obfs4proxy). But that no longer works
with the Debian tor packages; the tra
6 matches
Mail list logo