Has anybody played with chroot?  apparmor?  Seems like we should at least have 
a note about how to use them and/or some comments about how various options 
help security.

The others that I can think of are
  running as user ntp
  seccomp on Linux
  Owner of files.  In particular, the private key for the certificate and the 
keys file for shared keys.


-- 
These are my opinions.  I hate spam.



_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to