$ strings src/lib/process/cfgrpt/.libs/libcfgrpt.a | sed -n 's/;;;; //p'
- ``-X`` - As of Kea 3.0, disables path and permissions restrictions.
- The server will emit a warning at startup that sercurity restrctions
+ The server will emit a warning at startup that sercurity restrictions
have been disabled. Do not use this mode of operation without careful
consideration and taking any necessary precautions. Failure to do so can
expose deployments to security vulnerabilities. For more information
$ strings src/lib/process/cfgrpt/.libs/libcfgrpt.a | sed -n 's/;;;; //p'
- ``-X`` - As of Kea 3.0, disables path and permissions restrictions.
- The server will emit a warning at startup that sercurity restrctions
+ The server will emit a warning at startup that sercurity restrictions
have been disabled. Do not use this mode of operation without careful
consideration and taking any necessary precautions. Failure to do so can
expose deployments to security vulnerabilities. For more information
$ strings src/lib/process/cfgrpt/.libs/libcfgrpt.a | sed -n 's/;;;; //p'
- ``-X`` - As of Kea 3.0, disables path and permissions restrictions.
- The server will emit a warning at startup that sercurity restrctions
+ The server will emit a warning at startup that sercurity restrictions
have been disabled. Do not use this mode of operation without careful
consideration and taking any necessary precautions. Failure to do so can
expose deployments to security vulnerabilities. For more information
$ strings src/lib/process/cfgrpt/.libs/libcfgrpt.a | sed -n 's/;;;; //p'
- ``-X`` - As of Kea 3.0, disables path and permissions restrictions.
- The server will emit a warning at startup that sercurity restrctions
+ The server will emit a warning at startup that sercurity restrictions
have been disabled. Do not use this mode of operation without careful
consideration and taking any necessary precautions. Failure to do so can
expose deployments to security vulnerabilities. For more information
As of Kea 3.0, the path and permissions restrictions may be disabled by adding ``-X``
to command line of the Kea servers. The server will emit a warning at startup that
- sercurity restrctions have been disabled. Do not use this mode of operation without
+ sercurity restrictions have been disabled. Do not use this mode of operation without
careful consideration and taking any necessary precautions. Failure to do so may expose
deployments to security vulnerabilities. This command line option is supported by
all of the daemons: ``kea-dhcp4``, ``kea-dhcp6``, ``kea-dhcp-ddns``, and
performed by kea-ctrl-agent have been disabled via command line opion '-X'.
This means the server is not enforcing restrictions on resource
paths or permissions. This mode of operation may expose your
-environment to ecurity vulnerabilities and should only be used
+environment to security vulnerabilities and should only be used
after consideration.
performed by kea-dhcp-ddns have been disabled via command line opion '-X'.
This means the server is not enforcing restrictions on resource
paths or permissions. This mode of operation may expose your
-environment to ecurity vulnerabilities and should only be used
+environment to security vulnerabilities and should only be used
after consideration.
bool
PathChecker::pathHasPermissions(mode_t permissions, bool enforce_perms
- /* = PathChecker::shouldEnforceSecurity() */) const {
+ /* = PathChecker::shouldEnforceSecurity() */) const {
return((!enforce_perms) || hasPermissions(path_, permissions));
}
bool isDefaultOverridden();
/// @brief Indicates security checks should be enforced.
- static bool shouldEnforceSecurity();
+ static bool shouldEnforceSecurity();
/// @brief Enables or disables security enforcment checks.
///