I ran into this issue too. I think that, in principle, daemons should
not be able to write to their own configuration files, so making the
files owned by root is a good thing anyway. The only real trouble is
that things break on upgrade due to the earlier default ownership.


One other related issue is that the current CapabilityBoundingSet
appears to break the ip-transparent nsd option.

May 03 17:59:40 juniper nsd[20346]: setsockopt(...,IP_TRANSPARENT, ...) failed 
for udp: Operation not permitted
May 03 17:59:40 juniper nsd[20346]: setsockopt(...,IP_TRANSPARENT, ...) failed 
for udp: Operation not permitted
May 03 17:59:40 juniper nsd[20346]: setsockopt(...,IP_TRANSPARENT, ...) failed 
for tcp: Operation not permitted
May 03 17:59:40 juniper nsd[20346]: setsockopt(...,IP_TRANSPARENT, ...) failed 
for tcp: Operation not permitted

I had this in use as a workaround for:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765831

...and apparently I don't need the workaround anymore, but other use
cases for that option will presumably be broken still.

Thanks,
Corey

Reply via email to