main|ListenAndServe ERROR|listen tcp 0.0.0.0:443: bind: permission denied| | |
panic: listen tcp 0.0.0.0:443: bind: permission denied
goroutine 1 [running]:
runtime.panic(0x24ca00, 0xc21008f840)
/usr/local/go/src/pkg/runtime/panic.c:266 +0xb6
--
You received this message because you are subscribed to the Google Groups "golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email to golang-nuts...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
/Library/LaunchDaemons, and those describing agents are installed in /Library/LaunchAgents or in the LaunchAgents subdirectory of an individual user’s Library directory. (The appropriate location for executables that you launch from your job is /usr/local/libexec.)"launchctl load com.mydomain.webServer01.plist
bind(): Permission denied
A clean machine port 80 serving a static web site - what security issues?
Thank you. From your experience - what bug in Golang's ListAndServe can allow an attacker torun a code on the server?
Do you have a practical example?
package main
import (
"fmt"
"net/http"
)
func handler(w http.ResponseWriter, r *http.Request) {
fmt.Fprintf(w, "Hi there, I love %s!", r.URL.Path[1:])
}
func main() {
http.HandleFunc("/", handler)
http.ListenAndServe(":80", nil)
}
>Let's say you accidentally serve a file where some passwords are stored.I see - this is common sense. We can assume these precautions are taken.If we focus only on the coding and assume the system security considerationsare OK let see this code":
package main import ( "fmt" "net/http" ) func handler(w http.ResponseWriter, r *http.Request) { fmt.Fprintf(w, "Hi there, I love %s!", r.URL.Path[1:]) } func main() { http.HandleFunc("/", handler) http.ListenAndServe(":80", nil) }
What security risk we have here and how it can be prevented?
Thank you. From your experience - what bug in Golang's ListAndServe can allow an attacker to
run a code on the server? Do you have a practical example?
As I suspected it is more academic.
If we want to be more pragmatic - you never can be sure you have enough security,we take the necessary measures but still we have the question of "trusting trust" as I seethis in the paper.
If we are talking about trust - last week I bought mac-mini-server which I see its default settings
are light years ahead in security compared to what there was in Ubuntu by default.
The questions I have now is because of this more tightened security in mac-mini-server - I cannotdo things which I made before under Ubuntu - which is OK if I follow Apple's rules to makeit work right.
Dan,You shared very valuable information. i've been proactive and got rid of root already.
I added Nginx at the front and use it as reverse parodying 80->8080, 433->8443.
>"match in proto tcp from any to me port 80 rdr-to 127.0.0.1 port 8080"I tried with firewall too. Do I need that if I am using Nginx?