Date: Tue, 11 Dec 2018 12:15:55 -0700 From: Ian Lepore <ian@freebsd.org> To: Hubert Hauser <atypical@autisticstory.net>, freebsd-hackers@freebsd.org Subject: Re: Running Tor service in the jail environment Message-ID: <1544555755.44045.14.camel@freebsd.org> In-Reply-To: <f07cefab-7ace-bed7-3387-93e8f697af5b@autisticstory.net> References: <66526968-1446-c95e-629a-fb9e1b246111@mail.com> <1544543387.1860.347.camel@freebsd.org> <65a5540f-2f1c-0470-b650-cf9fd696ea7a@autisticstory.net> <1544555568.44045.12.camel@freebsd.org> <f07cefab-7ace-bed7-3387-93e8f697af5b@autisticstory.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 2018-12-11 at 20:13 +0100, Hubert Hauser wrote: > Hi there! > > > > > It sounds like a good idea but weren't a better solution use an > > open-hardware device acting as Tor router with installed OpenBSD or > > HardenedBSD? Why wouldn't you use for it jail environment? I want > > to > > place Tor in the jail environment because I want to prevent system > > being > > compromised in case compromising Tor service. > Ian, thank you for reply about disabling ntpd in jails but you > haven't > replied for above questions. > > Cheers, > Hubert. > I know nothing about tor, or hardendedbsd, or openbsd. I answered the part I do know about. -- Ian
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1544555755.44045.14.camel>