On Sun, Jul 25, 1999 at 11:36:49AM -0700, Matthew Dillon <[EMAIL PROTECTED]> 
wrote:
>     A sandbox is a security term.  It can mean two things:
> 
[...]
> 
>     UNIX implements two core sanboxes.  One is at the process level, and one
>     is at the userid level.
> 
>     Every UNIX process is completely firewalled off from every other UNIX
>     process.  One process can modify the address space of another.  This is
                             ^^^^

        Can not. Silly typo ;)

        BTW, I have running bind running chroot()'ed in /var/named (where
OpenBSD puts it). Can we now also put /var/named and all subdirs needed
into FreeBSD? We can also add '-t /var/named' flag into commented out
rc.conf startup for bind. I could supply more info to someone who can
commit this into the tree...

% tail /var/named/var/log/named-noise.log
25-Jul-1999 04:11:16.730 security: info: chrooted to /var/named
25-Jul-1999 04:11:16.871 security: info: group = bind
25-Jul-1999 04:11:16.872 security: info: user = bind
% ps ax | grep named
  113  ??  Is     0:00.02 /var/named/named -u bind -g bind -t /var/named



-- Yan


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to