Date: Tue, 11 Dec 2018 19:58:31 +0100 From: Hubert Hauser <atypical@autisticstory.net> To: freebsd-hackers@freebsd.org Subject: Re: Running Tor service in the jail environment Message-ID: <65a5540f-2f1c-0470-b650-cf9fd696ea7a@autisticstory.net> In-Reply-To: <1544543387.1860.347.camel@freebsd.org> References: <66526968-1446-c95e-629a-fb9e1b246111@mail.com> <1544543387.1860.347.camel@freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Hello! > You should not be running ntpd inside a jail, it won't have the > priveleges to set the kernel clock anyway, only the ntpd running in a > non-jailed environment can do that. How can I prevent running ntpd and lpd in the jail environment? > I wouldn't use a jail for that. Take a look at this article I wrote > about how to use Tor in the manner you're looking for: > > https://github.com/lattera/articles/blob/master/infosec/tor/2017-01-14_= torified_home/article.md It sounds like a good idea but weren't a better solution use an open-hardware device acting as Tor router with installed OpenBSD or HardenedBSD? Why wouldn't you use for it jail environment? I want to place Tor in the jail environment because I want to prevent system being compromised in case compromising Tor service. Thank you in advance, Hubert.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?65a5540f-2f1c-0470-b650-cf9fd696ea7a>