Zeitpunkt Nutzer Delta Tröts TNR Titel Version maxTL Do 10.10.2024 00:00:02 62.156 +4 3.777.177 60,8 Fosstodon 4.3.0 500 Mi 09.10.2024 00:00:08 62.152 -1 3.775.054 60,7 Fosstodon 4.3.0 500 Di 08.10.2024 00:00:02 62.153 +3 3.771.598 60,7 Fosstodon 4.2.13 500 Mo 07.10.2024 00:00:00 62.150 +2 3.768.787 60,6 Fosstodon 4.2.13 500 So 06.10.2024 00:01:07 62.148 +4 3.766.113 60,6 Fosstodon 4.2.13 500 Sa 05.10.2024 00:00:05 62.144 +1 3.764.649 60,6 Fosstodon 4.2.13 500 Fr 04.10.2024 00:00:07 62.143 +3 3.762.219 60,5 Fosstodon 4.2.13 500 Do 03.10.2024 00:00:23 62.140 0 3.759.060 60,5 Fosstodon 4.2.13 500 Mi 02.10.2024 00:00:06 62.140 +1 3.755.928 60,4 Fosstodon 4.2.13 500 Di 01.10.2024 00:01:13 62.139 0 3.752.620 60,4 Fosstodon 4.2.13 500
(@mort) · 05/2019 · Tröts: 1.794 · Folger: 185
Do 10.10.2024 11:43
Hey #Linux and #security people! I have a daemon process which sometimes has to fork off a child process to do some work. This child process does not need a lot of permissions, and it has a pretty large attack surface, so I want to run it as a very restricted user.
This would be trivial if the daemon was running as root, it could just fork and then change its user. But I obviously don't want to run the daemon as root. What's the best way to drop from a non-root user to a less privileged user?
[Öffentlich] Antw.: 0 Wtrl.: 0 Fav.: 0 · via Ivory for iOS