In my mediocre, pre-'90s universe, we use setuid to ascertain that we may drop privilegesafter binding the socket.
This is necessary, as one does not simply bind a port below 1025 without doing so as root.
In fact, that is the sole reason to run such stuff as root.
However, when set (left) as such, the software attempts to drop its privileges as soon as it evaluates the arguments.
To me, this makes somewhat limited sense.
Am I missing something?
I would be glad to receive some pointers.
In my mediocre, pre-'90s universe, we use
setuid
to ascertain that we may drop privileges after binding the socket. This is necessary, as one does not simply bind a port below 1025 without doing so as root. In fact, that is the sole reason to run such stuff as root.However, when set (left) as such, the software attempts to drop its privileges as soon as it evaluates the arguments.
To me, this makes somewhat limited sense.
Am I missing something? I would be glad to receive some pointers.