Any knowledge for sysctl?


 
Thread Tools Search this Thread
Special Forums IP Networking Any knowledge for sysctl?
Prev   Next
# 1  
Old 01-09-2002
Any knowledge for sysctl?

HI folks. I am developing a protocol and I need to bind to an IP address that is not configured to my machine. The problem is with bind(). The sysctl system call seamed to overcome the problem of bind if you set the proc/sys/net/ipv4/ip_nonlocal_bind flag. Although I tryed to set the flag either from command line by writing sysctl -w net.ipv4.ip_nonlocal_bind=1, or echo 1>proc/sys/net/ipv4/ip_nonlocal_bind, or programmatically by using the command sysctl(), or by seting its value from the /etc/sysctl.conf file, bind still generates an error. Does anybody have any idea of why this is happening? Is there any other way to bind to a non local IP address?

PS. In the kernel configuration the sysctl support(CONFIG_SYSCTL) is enabled together with the /proc file system support (CONFIG_PROC_FS).
 
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

programming knowledge

Hi Friends, I know very well the basic commands of Unix but i want to concentrate on unix shell programming can you please how to learn and suggest me how to become comfortable level. Thanks in advance (1 Reply)
Discussion started by: victory
1 Replies

2. UNIX for Dummies Questions & Answers

sysctl help needed.(Server Hardening).

As per Hardening guide for the server. ICMP Broadcast Response: The kernel parameter icmp_echo_ignore_broadcasts must match to 1 However when i check the value of icmp_echo_ignore_broadcasts it thrown an error as unkonwn key. # sysctl icmp_echo_ignore_broadcasts error:... (2 Replies)
Discussion started by: pinga123
2 Replies

3. Linux

Anyone with Blitz PHP knowledge

Blitz PHP I am having trouble installing Blitz PHP blitz-0.6.10.tar.gz Here is what i did: cd /tmp wget blitz-0.6.10.tar.gz tar zxfv blitz-0.6.10.tar.gz cd blitz-0.6.10 And then I tried ./configure Output: -bash: No such file in directory make Output: No targets in the... (1 Reply)
Discussion started by: kendel
1 Replies

4. Shell Programming and Scripting

Knowledge

Can somebody explain me the following part within a awk command: awk '{for(i=1;i<=NF;i++) if ($i=="mm")c++} Can somebody please explain me the part (i=1;i<=NF;i++) ????:D:D:D:D (1 Reply)
Discussion started by: RubinPat
1 Replies

5. AIX

knowledge

Dear All Kindly provide me with a difference between hdiskpower and hdisk regards (2 Replies)
Discussion started by: magasem
2 Replies

6. UNIX for Dummies Questions & Answers

How to get the knowledge in UNIX? Suggest me . Please.

Hai, friends. In one exam which i have to attend in the month of january, they asked "knowledge of c and unix are required" . I am beginner to unix, even i dont know from where to start . Please suggest me what to do , to get through the exam and interview. I have already downloaded... (2 Replies)
Discussion started by: nani_ynm
2 Replies

7. UNIX for Dummies Questions & Answers

unix knowledge

I am a new Unix user looking for ways, other than time, to become an effective unix administrator. All sugestions welcome. Thanks (10 Replies)
Discussion started by: dtooth71
10 Replies
Login or Register to Ask a Question
MAC_PORTACL(4)						   BSD Kernel Interfaces Manual 					    MAC_PORTACL(4)

NAME
mac_portacl -- network port access control policy SYNOPSIS
To compile the port access control policy into your kernel, place the following lines in your kernel configuration file: options MAC options MAC_PORTACL Alternately, to load the port access control policy module at boot time, place the following line in your kernel configuration file: options MAC and in loader.conf(5): mac_portacl_load="YES" DESCRIPTION
The mac_portacl policy allows administrators to administratively limit binding to local UDP and TCP ports via the sysctl(8) interface. In order to enable the mac_portacl policy, MAC policy must be enforced on sockets (see mac(4)), and the port(s) protected by mac_portacl must not be included in the range specified by the net.inet.ip.portrange.reservedlow and net.inet.ip.portrange.reservedhigh sysctl(8) MIBs. The mac_portacl policy only affects ports explicitly bound by a user process (either for a listen/outgoing TCP socket, or a send/receive UDP socket). This policy will not limit ports bound implicitly for outgoing connections where the process has not explicitly selected a port: these are automatically selected by the IP stack. When mac_portacl is enabled, it will control binding access to ports up to the port number set in the security.mac.portacl.port_high sysctl(8) variable. By default, all attempts to bind to mac_portacl controlled ports will fail if not explicitly allowed by the port access control list, though binding by the superuser will be allowed, if the sysctl(8) variable security.mac.portacl.suser_exempt is set to a non- zero value. Runtime Configuration The following sysctl(8) MIBs are available for fine-tuning the enforcement of this MAC policy. All sysctl(8) variables, except security.mac.portacl.rules, can also be set as loader(8) tunables in loader.conf(5). security.mac.portacl.enabled Enforce the mac_portacl policy. (Default: 1). security.mac.portacl.port_high The highest port number mac_portacl will enforce rules for. (Default: 1023). security.mac.portacl.rules The port access control list is specified in the following format: idtype:id:protocol:port[,idtype:id:protocol:port,...] idtype Describes the type of subject match to be performed. Either uid for user ID matching, or gid for group ID matching. id The user or group ID (depending on idtype) allowed to bind to the specified port. NOTE: User and group names are not valid; only the actual ID numbers may be used. protocol Describes which protocol this entry applies to. Either tcp or udp are supported. port Describes which port this entry applies to. NOTE: MAC security policies may not override other security system policies by allowing accesses that they may deny, such as net.inet.ip.portrange.reservedlow / net.inet.ip.portrange.reservedhigh. If the specified port falls within the range specified, the mac_portacl entry will not function (i.e., even the specified user/group may not be able to bind to the specified port). security.mac.portacl.suser_exempt Allow superuser (i.e., root) to bind to all mac_portacl protected ports, even if the port access control list does not explicitly allow this. (Default: 1). security.mac.portacl.autoport_exempt Allow applications to use automatic binding to port 0. Applications use port 0 as a request for automatic port allocation when bind- ing an IP address to a socket. This tunable will exempt port 0 allocation from rule checking. (Default: 1). SEE ALSO
mac(3), ip(4), mac_biba(4), mac_bsdextended(4), mac_ifoff(4), mac_mls(4), mac_none(4), mac_partition(4), mac_seeotheruids(4), mac_test(4), mac(9) HISTORY
MAC first appeared in FreeBSD 5.0 and mac_portacl first appeared in FreeBSD 5.1. AUTHORS
This software was contributed to the FreeBSD Project by NAI Labs, the Security Research Division of Network Associates Inc. under DARPA/SPAWAR contract N66001-01-C-8035 (``CBOSS''), as part of the DARPA CHATS research program. BSD
December 9, 2004 BSD