search for: net_bind_service

Displaying 6 results from an estimated 6 matches for "net_bind_service".

2007 Mar 01
1
TDM400p Loaded only once
...nel 02: FXS Kewlstart (Default) (Slaves: 02) Channel 03: FXS Kewlstart (Default) (Slaves: 03) Channel 04: FXS Kewlstart (Default) (Slaves: 04) 4 channels configured. ZT_CHANCONFIG failed on channel 1: No such device or address (6) This is part of my dmesg audit(1172747900.510:5): avc: denied { net_bind_service } for pid=1657 comm="hidd" capability=10 scontext=system_u:system_r:bluetooth_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=capability SELinux: initialized (dev autofs, type autofs), uses genfs_contexts eth0: no IPv6 routers present [drm] Initialized drm 1.1.0 20060810 ACPI: PCI...
2019 Dec 30
2
dovecot cannot drop privileges inside singularity container
Hi all I'm facing an issue while running dovecot inside a singularity (https://sylabs.io/singularity/) container dovecot version is 2.3.4.1 (configuration below) running on debian buster, inside a container made with singularity version 3.4.2 unfortunately, when I try to start dovecot, it gives: Singularity test.sif:~> cat /var/log/mail.log Dec 30 17:23:38 testnode dovecot: master:
2019 Dec 02
2
running dovecot under different user
Did anyone ever managed to run dovecot as a non-root user?
2020 Jan 02
0
dovecot cannot drop privileges inside singularity container
Have you tried setting linux capabilities, like NET_BIND_SERVICE,CHOWN,SYS_CHROOT,SETGID? Have you checked the permissions of paths? I had to relocate the run dir with things like these && mkdir /var/dovecot \ && mkdir /var/lib/dovecot \ && (umask 027 ; mkdir /var/dovecot/login) \ && (umask 022 ; mkdir /var/dove...
2023 Mar 28
0
dns_tkey_gssnegotiate: TKEY is unacceptable
...ol] path = /var/lib/samba/sysvol read only = No [netlogon] path = /var/lib/samba/sysvol/thecompumax.com/scripts read only = No -------------------- /etc/hosts 127.0.0.1 localhost 192.168.2.3 compumaxdc03.thecompumax.com compumaxdc03 -------------------- /etc/apparmor.d/usr/sbin.named capability net_bind_service, capability setgid, capability setuid, capability sys_chroot, capability sys_resource, /etc/bind/** r, /var/lib/bind/** rw, /var/lib/bind/ rw, /var/cache/bind/** lrw, /var/cache/bind/ rw, # Database file used by allow-new-zones /var/cache/bind/_default.nzd-lock rwk, # gss...
2019 May 15
1
Workstations cannot update DNS
> > > > *named.conf.options* > > > > options { > > > > directory "/var/cache/bind"; > > > > > > > > // If there is a firewall between you and nameservers you want > > > > // to talk to, you may need to fix the firewall to allow > > multiple > > > > // ports to talk.