From owner-freebsd-security Sun Oct 10 8:15:12 1999 Delivered-To: freebsd-security@freebsd.org Received: from ns1.via-net-works.net.ar (ns1.via-net-works.net.ar [200.10.100.10]) by hub.freebsd.org (Postfix) with ESMTP id 50BE615578 for ; Sun, 10 Oct 1999 08:14:29 -0700 (PDT) (envelope-from fpscha@ns1.via-net-works.net.ar) Received: (from fpscha@localhost) by ns1.via-net-works.net.ar (8.8.5/8.8.4) id MAA20954; Sun, 10 Oct 1999 12:13:25 -0300 (GMT) From: Fernando Schapachnik Message-Id: <199910101513.MAA20954@ns1.via-net-works.net.ar> Subject: Re: chroot jail in pre 4.0 In-Reply-To: <19991008170540.A1618@fever.semiotek.com> from Justin Wells at "Oct 8, 99 05:05:40 pm" To: jread@semiotek.com (Justin Wells) Date: Sun, 10 Oct 1999 12:13:25 -0300 (GMT) Cc: freebsd-security@FreeBSD.ORG Reply-To: Fernando Schapachnik X-Mailer: ELM [version 2.4ME+ PL40 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Keep in mind that you still can do: sh prg.sh or perl prg.pl on a noexec partition. Regards. En un mensaje anterior, Justin Wells escribió: > > I have several daemons running chrooted on my box, and I am wondering just > how safe I can make things under 3.3/3.2. I will definately be using jail() > once that's available to me, but currently it's not.. [...] Fernando P. Schapachnik Administración de la red VIA Net Works Argentina SA Diagonal Roque Sáenz Peña 971, 4º y 5º piso. 1035 - Capital Federal, Argentina. (54-11) 4323-3333 http://www.via-net-works.net.ar To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message