Date: Wed, 4 Sep 2019 14:55:34 -0400 From: Zaphod Beeblebrox <zbeeble@gmail.com> To: FreeBSD Hackers <freebsd-hackers@freebsd.org> Subject: A jail notion. Message-ID: <CACpH0Md72MVA6v5eify=FQxbQK-b79De8DRWJ0d_oCHxQ%2BCAjA@mail.gmail.com>
next in thread | raw e-mail | index | archive | help
So... in general, I put jails in /jail. I could, for instance, aggregate all unique userids and groupids into /etc/master.password and /etc/group by scanning /jail/*/etc/master.passwd, but then again, I could also run kerb. This could be further generalized by following the jail root configured in /etc/jail.conf. Now... I admit the fact that not all jails will have a password or group file, but looking at the fairly vast number of jails that I deploy, at least for me, they almost all have password and group files. What am I getting at? Running top on the host ... many of the jail users end up as numbers. It would be supremely helpful if top was jail-enabled in this manner. In fact, although I routinely consider kerberos ... I don't think it would solve this problem. What does the userid of a process look like under kerb? Anyways... food for thought.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CACpH0Md72MVA6v5eify=FQxbQK-b79De8DRWJ0d_oCHxQ%2BCAjA>