diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-09 13:14:36 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-09 13:14:36 +0000 |
commit | 5e7a022920dd5834e3645bbf7e1ba5752ba633a1 (patch) | |
tree | cd44616fa76ffd61f590243fba3e370d5a7056f6 /debian/iproute2.templates | |
parent | Adding upstream version 6.8.0. (diff) | |
download | iproute2-5e7a022920dd5834e3645bbf7e1ba5752ba633a1.tar.xz iproute2-5e7a022920dd5834e3645bbf7e1ba5752ba633a1.zip |
Adding debian version 6.8.0-1.debian/6.8.0-1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'debian/iproute2.templates')
-rw-r--r-- | debian/iproute2.templates | 20 |
1 files changed, 20 insertions, 0 deletions
diff --git a/debian/iproute2.templates b/debian/iproute2.templates new file mode 100644 index 0000000..ca18a29 --- /dev/null +++ b/debian/iproute2.templates @@ -0,0 +1,20 @@ +Template: iproute2/setcaps +Type: boolean +Default: false +_Description: Allow ordinary users to run ip vrf exec using capabilities? + iproute2 can be used to configure and use Virtual Routing and Forwarding (VRF) + functionality in the kernel. + This normally requires root permissions, but sometimes it's useful to allow + ordinary users to execute commands from inside a virtual routing and forwarding + domain. E.g. ip vrf exec examplevrf ping 10.0.0.1 + . + The ip command supports dropping capabilities, making an exception for ip vrf exec. + The drawback of setting the permissions is that if in the unlikely case of a + security critical bug being found before the ip command has dropped capabilities + then it could be used by an attacker to gain root permissions. + It's up to you to decide about the trade-offs and select the best setting for your + system. + This will give cap_dac_override, cap_net_admin and cap_bpf to /bin/ip. + . + More information about VRF can be found at: + https://www.kernel.org/doc/Documentation/networking/vrf.txt |