Has anybody played with chroot? apparmor? Seems like we should at least have a note about how to use them and/or some comments about how various options help security.
The others that I can think of are running as user ntp seccomp on Linux Owner of files. In particular, the private key for the certificate and the keys file for shared keys. -- These are my opinions. I hate spam. _______________________________________________ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel