diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-04 14:18:53 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-04 14:18:53 +0000 |
commit | 5945381473a21b70363970da542de653bde5ebe6 (patch) | |
tree | 43aaa5e78be817349b1e7085cce6784d1a87bb2d /debian/iproute2.templates | |
parent | Adding upstream version 6.1.0. (diff) | |
download | iproute2-5945381473a21b70363970da542de653bde5ebe6.tar.xz iproute2-5945381473a21b70363970da542de653bde5ebe6.zip |
Adding debian version 6.1.0-3.debian/6.1.0-3debian
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'debian/iproute2.templates')
-rw-r--r-- | debian/iproute2.templates | 20 |
1 files changed, 20 insertions, 0 deletions
diff --git a/debian/iproute2.templates b/debian/iproute2.templates new file mode 100644 index 0000000..38ba278 --- /dev/null +++ b/debian/iproute2.templates @@ -0,0 +1,20 @@ +Template: iproute2/setcaps +Type: boolean +Default: false +_Description: Allow ordinary users to run ip vrf exec using capabilities? + iproute2 can be used to configure and use Virtual Routing and Forwarding (VRF) + functionality in the kernel. + This normally requires root permissions, but sometimes it's useful to allow + ordinary users to execute commands from inside a virtual routing and forwarding + domain. E.g. ip vrf exec examplevrf ping 10.0.0.1 + . + The ip command supports dropping capabilities, making an exception for ip vrf exec. + The drawback of setting the permissions is that if in the unlikely case of a + security critical bug being found before the ip command has dropped capabilities + then it could be used by an attacker to gain root permissions. + It's up to you to decide about the trade-offs and select the best setting for your + system. + This will give cap_dac_override, cap_net_admin and cap_sys_admin to /bin/ip. + . + More information about VRF can be found at: + https://www.kernel.org/doc/Documentation/networking/vrf.txt |