diff options
author | B. Watson <yalhcru@gmail.com> | 2018-08-03 05:57:19 +0700 |
---|---|---|
committer | Willy Sudiarto Raharjo <willysr@slackbuilds.org> | 2018-08-04 08:17:11 +0700 |
commit | c307650f720584677c21b0d311ff566df8b83dfc (patch) | |
tree | 378182019151f2409c0ac346b3cd520e1cb322f5 /network/ipxnet/rc.ipxnet.conf | |
parent | f516576ada936b719baa671f569f1a4b2ffabea9 (diff) | |
download | slackbuilds-c307650f720584677c21b0d311ff566df8b83dfc.tar.gz |
network/ipxnet: Added (tunnel IPX over TCP/IP).
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'network/ipxnet/rc.ipxnet.conf')
-rw-r--r-- | network/ipxnet/rc.ipxnet.conf | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/network/ipxnet/rc.ipxnet.conf b/network/ipxnet/rc.ipxnet.conf new file mode 100644 index 0000000000..bc9bfa34a0 --- /dev/null +++ b/network/ipxnet/rc.ipxnet.conf @@ -0,0 +1,15 @@ +# Config file for SBo ipxnet startup script, by B. Watson <yalhcru@gmail.com>. + +# ipxnet-system binary runs setuid nobody by default, but has the +# cap_net_bind_service capability set. This gives the ipxnet-system +# process the capability to open low-numbered ports (any port < 1024), +# which could be a security concern: if ipxnet can be exploited, the +# exploit code could listen on e.g. the ssh or http port. The alternative +# (running ipxnet with root privileges) is much worse though: the exploit +# code could do *anything* in that case. + +# The official assigned port number: +IPXPORT=213 + +# The port number from the DOSBox examples: +# IPXPORT=19900 |