From owner-freebsd-security Tue Jun 13 5:22:21 2000 Delivered-To: freebsd-security@freebsd.org Received: from burka.carrier.kiev.ua (burka.carrier.kiev.ua [193.193.193.107]) by hub.freebsd.org (Postfix) with ESMTP id 6BAC437B9B5 for ; Tue, 13 Jun 2000 05:22:14 -0700 (PDT) (envelope-from netch@lucky.net) Received: from netch@localhost by burka.carrier.kiev.ua id PIN69101 for freebsd-security@freebsd.org; Tue, 13 Jun 2000 15:22:11 +0300 (EEST) (envelope-from netch) Date: Tue, 13 Jun 2000 15:22:11 +0300 From: Valentin Nechayev To: freebsd-security@freebsd.org Subject: O_NOFOLLOW Message-ID: <20000613152211.B42067@lucky.net> Reply-To: netch@lucky.net Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0i X-42: On Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org O_NOFOLLOW flag for open() syscall exists since 3.0-CURRENT and is quite useful for secure open, but is not documented in open(2) man page yet. Do FreeBSD team have its disclosing in plans? -- NVA To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message