Skip to content
This repository was archived by the owner on Jul 2, 2023. It is now read-only.

Conversation

@ntninja
Copy link

@ntninja ntninja commented Sep 27, 2018

Allow socat to bind to privileged ports inside of the container when run as user process.
Example command-line: docker run --rm --user "2004" --cap-add NET_BIND_SERVICE socat tcp6-listen:443,fork tcp4:mail:443

If --cap-add NET_BIND_SERVICE is not set then this change does nothing.

I guess documentation should be also updated to recommend this by default, since privilege dropping is always good.

@gaby
Copy link
Contributor

gaby commented Aug 13, 2022

This change shouldn't be baked into the image. It should be up to the user to add the right capabilities to their container.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Development

Successfully merging this pull request may close these issues.

2 participants