Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 25 Jul 1999 16:18:39 -0700
From:      "Jan B. Koum " <jkb@best.com>
To:        Matthew Dillon <dillon@apollo.backplane.com>, Sue Blake <sue@welearn.com.au>
Cc:        freebsd-hackers@FreeBSD.ORG, freebsd-doc@FreeBSD.ORG
Subject:   Re: sandbox??
Message-ID:  <19990725161839.A16546@best.com>
In-Reply-To: <199907251836.LAA41121@apollo.backplane.com>; from Matthew Dillon on Sun, Jul 25, 1999 at 11:36:49AM -0700
References:  <19990726040233.E7349@welearn.com.au> <199907251836.LAA41121@apollo.backplane.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Jul 25, 1999 at 11:36:49AM -0700, Matthew Dillon <dillon@apollo.backplane.com> wrote:
>     A sandbox is a security term.  It can mean two things:
> 
[...]
> 
>     UNIX implements two core sanboxes.  One is at the process level, and one
>     is at the userid level.
> 
>     Every UNIX process is completely firewalled off from every other UNIX
>     process.  One process can modify the address space of another.  This is
                             ^^^^

	Can not. Silly typo ;)

	BTW, I have running bind running chroot()'ed in /var/named (where
OpenBSD puts it). Can we now also put /var/named and all subdirs needed
into FreeBSD? We can also add '-t /var/named' flag into commented out
rc.conf startup for bind. I could supply more info to someone who can
commit this into the tree...

% tail /var/named/var/log/named-noise.log
25-Jul-1999 04:11:16.730 security: info: chrooted to /var/named
25-Jul-1999 04:11:16.871 security: info: group = bind
25-Jul-1999 04:11:16.872 security: info: user = bind
% ps ax | grep named
  113  ??  Is     0:00.02 /var/named/named -u bind -g bind -t /var/named



-- Yan


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990725161839.A16546>