would help me alot. I'm not asking for a
> > fix, since I will eventually upgrade the system anyway.
http://www.ussg.iu.edu/hypermail/linux/kernel/0304.0/1062.html
I'm just guessing by your kernelversion number you've applied this
patch. I could be totally wrong though. :)
Rega
onally just let the hosts syslog-ng listen to the /dev/log in the
vserver and have the hosts vserver scripts handle the
stopping/starting. No need for even a /bin/sh or /lib in my vservers. :)
Regards,
Erik Smit
___
Vserver mailing list
[EMAIL PROTECTE
Hi Herbert,
I would be interested in this feature. It's sometimes hard to pin-point
the cause of some abuse on your machine and if you can log the ttys you
can actually see somebody doing it.
Regards,
Erik Smit
On Sat, Feb 21, 2004 at 11:46:08PM +0100, Herbert Poetzl wrote:
>
&g
Hi Herbert,
This only happens on Debian Woody. Upgrading to Sarge fixed this for me.
Regards,
Erik Smit
On Sat, Feb 14, 2004 at 11:09:29PM +0100, Herbert Poetzl wrote:
>
> Hi Community!
>
> I don't know why, but debian toolchain seems to
> mislike switch() statements wit
he exploit chmods it to 001.
I fell for this one also. :)
Regards,
Erik Smit
___
Vserver mailing list
[EMAIL PROTECTED]
http://list.linux-vserver.org/mailman/listinfo/vserver
On Tue, Feb 03, 2004 at 05:16:14PM +0100, Gebhardt Thomas wrote:
> 1. The router did not send an arp request.
> 2. The host did not receive the request for some reason
> 3. The host did not answer the request
> 4. The router did not cache the answer
tcpdump is your friend. :)
Regards
ndard /sbin/init or /sbin/rc.
It would be nice if this was integrated since I'm applying this patch
every new version. If not, please tell me why.
If anybody else has any comments on or question about this, please fire
away.
Regards,
Erik Smit
Ok, but outgoing connections cause traffic originating from high ports
already. This has nothing to do with the SNAT.
Regards,
Erik Smit
On Sat, Jan 10, 2004 at 07:50:12PM -, Lu?s Miguel Silva wrote:
> I use SNAT to let my vservers connect to the internet because otherwise the
> p
less you configured netfilter (iptables/ipchains/etc.) to do that, no.
(afaik)
Regards,
Erik Smit
___
Vserver mailing list
[EMAIL PROTECTED]
http://list.linux-vserver.org/mailman/listinfo/vserver
(or a firewall log)
Regards,
Erik Smit
___
Vserver mailing list
[EMAIL PROTECTED]
http://list.linux-vserver.org/mailman/listinfo/vserver
ause the the modprobe it attached to was running as
CTX-0.
So I wouldn't be surprised if another kernel exploit would also be able
to break out of a vserver. It only protects against userlevel exploits.
Regards,
Erik Smit
___
Vserver mailing list
[EMAIL PROTECTED]
http://list.linux-vserver.org/mailman/listinfo/vserver
ine has been running for 6 hours now with users working on it
and I haven't seen any unexpected sideeffects yet, so it looks stable to
me.
Regards,
Erik Smit
___
Vserver mailing list
[EMAIL PROTECTED]
http://list.linux-vserver.org/mailman/listinfo/vserver
socket on the master server.
> That's part of the vserver concept, isn't it?
Well, I've bind-mounted my mysqld-vserver socket into my webserver-vserver
and it's able to communicate with it, even though they run in different
contexts.
--
Regards,
Erik Smit
__
13 matches
Mail list logo