[prev in list] [next in list] [prev in thread] [next in thread] 

List:       freebsd-hackers
Subject:    Re: A jail notion.
From:       Lowell Gilbert <freebsd-lists () be-well ! ilk ! org>
Date:       2019-09-04 22:30:26
Message-ID: 44zhjjsni5.fsf () be-well ! ilk ! org
[Download RAW message or body]

Zaphod Beeblebrox <zbeeble@gmail.com> writes:

> So... in general, I put jails in /jail.  I could, for instance, aggregate
> all unique userids and groupids into /etc/master.password and /etc/group by
> scanning /jail/*/etc/master.passwd, but then again, I could also run kerb.
> This could be further generalized by following the jail root configured in
> /etc/jail.conf.
>
> Now... I admit the fact that not all jails will have a password or group
> file, but looking at the fairly vast number of jails that I deploy, at
> least for me, they almost all have password and group files.
>
> What am I getting at?  Running top on the host ... many of the jail users
> end up as numbers.  It would be supremely helpful if top was jail-enabled
> in this manner.  In fact, although I routinely consider kerberos ... I
> don't think it would solve this problem.  What does the userid of a process
> look like under kerb?
>
> Anyways... food for thought.

A perl hacker could add that too sysutils/jtop...
_______________________________________________
freebsd-hackers@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org"
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic