Basically, what I want is the opposite of this. I want to be able to bind a service to a high-numbered port with the peace of mind that comes with knowing the O/S is treating that port the same way it treats a well-known port, and if my service dies some errant process can't just jump in and bind to that port itself.
My gut tells me this is a job for SELinux, but I'm not sure how I'd implement that and I'm curious what you guys come up with.
(I want to do this because automated port scans usually only bother to do the first thousand / 1024 ports, and I want to scatter my services pseudorandomly across the other ~64,000 to make the signal-to-noise ratio lower for separating suspicious activity from highly suspicious activity in the logs, and to make recon more difficult by nearly six (base 2) orders of magnitude.)
Ports below 1024 can only be opened by root or processes running as root.I know. In fact, that's the key piece of information my question pivots upon.Another issue is many corporations have incoming and outgoing firewalls, that prevent you from going to any site to any random port.I'm not going to be running the kind of servers the general public needs access to on weird ports, nor am I planning on using company resources to work on these machines. So, unless I decide to get into corporate espionage in the next couple days, this is a moot point. – Parthian Shot Jan 14 '16 at 20:23