Skip to content
Snippets Groups Projects
Commit 0b33e38e authored by Peter Palfrader's avatar Peter Palfrader
Browse files

Re-add CAP_DAC_OVERRIDE to the CapabilityBoundingSet.

Tor checks properties of hidden service directories as root before
changing its UID to debian-tor, and those trees are owned by debian-tor
and go-rwx (closes: #847598).
parent bd8c7b0d
No related branches found
Tags debian-tor-0.2.4.27-2
No related merge requests found
tor (0.2.8.11-2) unstable; urgency=medium
* Re-add CAP_DAC_OVERRIDE to the CapabilityBoundingSet. Tor checks
properties of hidden service directories as root before changing its UID
to debian-tor, and those trees are owned by debian-tor and go-rwx
(closes: #847598).
-- Peter Palfrader <weasel@debian.org> Fri, 09 Dec 2016 19:23:24 +0100
tor (0.2.8.11-1) unstable; urgency=medium
* New upstream version.
......
......@@ -29,7 +29,7 @@ ProtectSystem=full
ReadOnlyDirectories=/
ReadWriteDirectories=-/var/lib/tor-instances
ReadWriteDirectories=-/var/run
CapabilityBoundingSet=CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE
CapabilityBoundingSet=CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE CAP_DAC_OVERRIDE
[Install]
WantedBy=multi-user.target
......@@ -31,4 +31,4 @@ ReadWriteDirectories=-/proc
ReadWriteDirectories=-/var/lib/tor
ReadWriteDirectories=-/var/log/tor
ReadWriteDirectories=-/var/run
CapabilityBoundingSet=CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE
CapabilityBoundingSet=CAP_SETUID CAP_SETGID CAP_NET_BIND_SERVICE CAP_DAC_OVERRIDE
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment