1 |
Luke-Jr wrote: |
2 |
> On Thursday 30 September 2004 2:04 pm, Paul de Vrieze wrote: |
3 |
> |
4 |
>>Well, the issue is that without being root the file permissions in the |
5 |
>>install stage will not be correct. The only even more secure option |
6 |
>>besides the sandbox would be some kind of chroot with an overlay |
7 |
>>filesystem. That would though require a nonstandard kernel module and as |
8 |
>>such raise all kinds of other problems. |
9 |
> |
10 |
> Simply implementing sandbox as a kernel module would have the same security |
11 |
> effect as such a chroot. Then, libsandbox (or whatever it's called) could |
12 |
> simply use the module if available and fallback to the normal way if it's |
13 |
> not... |
14 |
|
15 |
So in other words, breaking all installs that don't use kernel modules? |
16 |
|
17 |
Steve |
18 |
|
19 |
|
20 |
-- |
21 |
gentoo-dev@g.o mailing list |