Date: Wed, 04 Sep 2019 18:30:26 -0400 From: Lowell Gilbert <freebsd-lists@be-well.ilk.org> To: Zaphod Beeblebrox <zbeeble@gmail.com> Cc: FreeBSD Hackers <freebsd-hackers@freebsd.org> Subject: Re: A jail notion. Message-ID: <44zhjjsni5.fsf@be-well.ilk.org> In-Reply-To: <CACpH0Md72MVA6v5eify=FQxbQK-b79De8DRWJ0d_oCHxQ%2BCAjA@mail.gmail.com> (Zaphod Beeblebrox's message of "Wed, 4 Sep 2019 14:55:34 -0400") References: <CACpH0Md72MVA6v5eify=FQxbQK-b79De8DRWJ0d_oCHxQ%2BCAjA@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Zaphod Beeblebrox <zbeeble@gmail.com> writes: > So... in general, I put jails in /jail. I could, for instance, aggregate > all unique userids and groupids into /etc/master.password and /etc/group by > scanning /jail/*/etc/master.passwd, but then again, I could also run kerb. > This could be further generalized by following the jail root configured in > /etc/jail.conf. > > Now... I admit the fact that not all jails will have a password or group > file, but looking at the fairly vast number of jails that I deploy, at > least for me, they almost all have password and group files. > > What am I getting at? Running top on the host ... many of the jail users > end up as numbers. It would be supremely helpful if top was jail-enabled > in this manner. In fact, although I routinely consider kerberos ... I > don't think it would solve this problem. What does the userid of a process > look like under kerb? > > Anyways... food for thought. A perl hacker could add that too sysutils/jtop...
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44zhjjsni5.fsf>