<html style="direction: ltr;">
<head>
<meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
<style type="text/css">body p { margin-bottom: 0.2cm; margin-top: 0pt; } </style>
</head>
<body style="direction: ltr;"
bidimailui-detected-decoding-type="UTF-8" bgcolor="#FFFFFF"
text="#000000">
<div class="moz-cite-prefix">On 04/03/14 11:39, Elazar Leibovich
wrote:<br>
</div>
<blockquote
cite="mid:CAHNTFmKPf58TTf78jSd5mt2+_0zYO8qfZe2Vasf1YRtDXensQg@mail.gmail.com"
type="cite">
<div dir="ltr">You can add capability of raw socket to the
executable, hence run as non-root.
<div><br>
</div>
<div>Since what you're asking means potentially send illegal
(unrouteable) IP packets, I guess that indeed the kernel will
require special privileges to enable you to do that.</div>
<div><br>
</div>
<div>As I said, you can mitigate that with capabilities, or use
the old method of start as root, bind socket and drop
privileges, or use a small server creating such sockets
running as root.</div>
</div>
<div class="gmail_extra">
<br>
</div>
<br>
</blockquote>
Or (very very slightly) modify the source of "privbind", a project
that started due to someone asking a question on this very mailing
list.<br>
<br>
Shachar<br>
<a class="moz-txt-link-freetext" href="http://sourceforge.net/projects/privbind/">http://sourceforge.net/projects/privbind/</a><br>
</body>
</html>