Date: Tue, 26 Jun 2018 23:47:52 +0300 From: =?UTF-8?B?Sm9obiBGcmVlbWFu?= <quake2k@mail.ru> To: =?UTF-8?B?Um9nZXIgTWFycXVpcw==?= <marquis@roble.com> Cc: freebsd-security@freebsd.org, freebsd-jail@freebsd.org Subject: =?UTF-8?B?UmU6IEphaWxpbmcge29wZW4sfW50cGQ=?= Message-ID: <1530046072.33630487@f142.i.mail.ru> In-Reply-To: <nycvar.OFS.7.76.444.1806261238560.57821@mx.roble.com> References: <nycvar.OFS.7.76.444.1806261238560.57821@mx.roble.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Why not with according devfs rules?
>Вторник, 26 июня 2018, 23:00 +03:00 от Roger Marquis <marquis@roble.com>:
>
>Has anyone configured {open,}ntpd to run in a FreeBSD jail or Linux
>container? Can it be done in such a way that a breached daemon would
>not have access to the host?
>
>Roger Marquis
>_______________________________________________
>freebsd-security@freebsd.org mailing list
>https://lists.freebsd.org/mailman/listinfo/freebsd-security
>To unsubscribe, send any mail to " freebsd-security-unsubscribe@freebsd.org "
С уважением,
John Freeman
quake2k@mail.ru
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1530046072.33630487>
