Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 17 Jun 2019 20:19:54 +0530
From:      Shivank Garg <shivank@freebsd.org>
To:        freebsd-hackers@freebsd.org
Subject:   Re:
Message-ID:  <CAOVCmzEbC6uS8qbHNv7rg4eVOdNE0tMFi6Y74jzRrOMYScptrQ@mail.gmail.com>
In-Reply-To: <CAOVCmzHt3at2rL-rP5KaT5pgbb20tazUEmJ6br=8a_YHzYMdQA@mail.gmail.com>
References:  <CAOVCmzHt3at2rL-rP5KaT5pgbb20tazUEmJ6br=8a_YHzYMdQA@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Please ignore this mail

On Mon, Jun 17, 2019 at 8:15 PM Shivank Garg <shivank@freebsd.org> wrote:

> Hi, Everyone!
> This project is aimed at developing a loadable MAC module with the "The
> TrustedBSD MAC Framework" to limit the set of IP addresses a VNET-enabled
> Jail can choose from.
>
> This Week-
> - I compiled a basic MAC policy module which restricts from setting Jail's
> IP address.
> - Read about syctl.
> - Wrote a test shell script and test cases for the module.
> - I thought about the design and plausible improvements in design
>
>
> Do Check this project on
> Github:
> https://github.com/shivankgarg98/freebsd/tree/shivank_MACPolicyIPAddressJail/sys/security/mac_ipacl
> FreeBSD wiki:
> https://wiki.freebsd.org/SummerOfCode2019Projects/MACPolicyIPAddressJail
>
> Please feel free to share your ideas and feedback on this project.
>
> Regards,
> Shivank Garg
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAOVCmzEbC6uS8qbHNv7rg4eVOdNE0tMFi6Y74jzRrOMYScptrQ>