From e8b89a610443f32b901801668cbae634e13f3e68 Mon Sep 17 00:00:00 2001 From: Ondrej Zajicek Date: Sun, 15 May 2011 16:29:44 +0200 Subject: Update and document the privilege restriction. --- doc/bird.sgml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) (limited to 'doc') diff --git a/doc/bird.sgml b/doc/bird.sgml index 31b2c03..01e70e8 100644 --- a/doc/bird.sgml +++ b/doc/bird.sgml @@ -145,10 +145,42 @@ options. The most important ones are: -s use given filename for a socket for communications with the client, default is /var/run/bird.ctl. + + -u + drop privileges and use that user ID, see the next section for details. + + -g + use that group ID, see the next section for details.

BIRD writes messages about its work to log files or syslog (according to config). +Privileges + +

BIRD, as a routing daemon, uses several privileged operations (like +setting routing table and using raw sockets). Traditionally, BIRD is +executed and runs with root privileges, which may be prone to security +problems. The recommended way is to use a privilege restriction +(options A nonprivileged user (as an argument to Finally, there is a possibility to use external tools to run BIRD in +an environment with restricted privileges. This may need some +configuration, but it is generally easy -- BIRD needs just the +standard library, privileges to read the config file and create the +control socket and the CAP_NET_* capabilities. + About routing tables

BIRD has one or more routing tables which may or may not be -- cgit v1.2.3