Summary: | ntpd crashes with "cap_set_proc failed" when using -U ntp | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Jeremy Heslop <jeremy> |
Component: | [OLD] Server | Assignee: | SpanKY <vapier> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | x86 | ||
OS: | Linux | ||
URL: | http://forums.gentoo.org/viewtopic.php?t=116871&highlight=capsetproc | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Jeremy Heslop
2004-01-06 12:09:02 UTC
I think I figured this out. Maybe someone else can test it. (note: you should only need this if using 2.6 kernels (possibly 2.5 as well)) The forum link up above was the answer. For a complete bug fix and entry I have included the fix I used here. I turned on these options in the kernel: CONFIG_SECURITY=y CONFIG_SECURITY_CAPABILITIES=m or y use these in "make menuconfig": Security options ---> [*] Enable different security models <M> Default Linux Capabilities or <*> Default Linux Capabilities If you use the module you will need to modprobe the capability module like so: modprobe capability and include the line capability in the "/etc/modules.autoload.d/kernel-2.6" file. I was then able to ue the NTPD_OPTS="-U ntp" option in the "/etc/conf.d/ntpd" file successfully and have a more secure ntpd running. thanks for the link hopefully ntp-4.2.0 wont need this |