On Mon, 29 May 2006, Anatoli Klassen wrote:

David Malone wrote:
On Sun, May 28, 2006 at 03:46:06PM +0200, Anatoli Klassen wrote:
if security.bsd.see_other_uids is set to 0, users from the main system can still see processes from jails if they have (by accident) the save uid.

For me it's wrong behavior because the main system and the jail are two different systems where uids are independent.

You could try the following (untested) patch to the MAC seeotheruid
module. You'd need to compile a kernel with the MAC option and then:

Thanks for the patch, maybe I'll need something like that for my environment.

But my question is if it's really intended that jail is not real virtual system but just a way to limit interaction from jail to host and not vice versa.

If it's the case than this has to be specified in jail(8).

Yes, this is a documentation bug. It is more precise to think of jail as a subsetting service than a virtualizing service: processes in jails see a subset of the system resources, rather than virtualized versions. So, for example, they see a subset of the file system name space, a subset of the IP/port name space, a subset of the process list, etc. This means that applications in the "host" environment overlap with the jail environments by virtue of also having access to that subset, as they can directly name files in the file system subset, IP and port bindings, processes, and so on. This does appear unclear from a quick skim of the man page, so something on the order of the above, with practical suggestions on what this implies, is required in the page.

Robert N M Watson
_______________________________________________
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to