summaryrefslogtreecommitdiffstats
path: root/usr.sbin/jail
Commit message (Collapse)AuthorAgeFilesLines
* New sentence starts on a new line.bz2009-01-241-1/+2
| | | | MFC after: 2 week
* Update the description of the '-h' option wrt to primary addressesbz2009-01-241-4/+5
| | | | | | per address family and add a reference to the ip-addresses option. MFC after: 1 week
* s,unmount 8,umount 8, it is unmount(2) which I did not mean.bz2009-01-171-2/+2
| | | | | Submitted by: pluknet@gmail.com MFC after: 1 week
* o Sort .Xr.maxim2009-01-121-2/+2
|
* Add a short section talking about jails and file systems; mention thebz2009-01-111-1/+26
| | | | | | | | mountand jail-aware file systems as well as quota. PR: kern/68192 Reviewed by: simon MFC after: 2 weeks
* MFp4:bz2008-11-293-21/+283
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Bring in updated jail support from bz_jail branch. This enhances the current jail implementation to permit multiple addresses per jail. In addtion to IPv4, IPv6 is supported as well. Due to updated checks it is even possible to have jails without an IP address at all, which basically gives one a chroot with restricted process view, no networking,.. SCTP support was updated and supports IPv6 in jails as well. Cpuset support permits jails to be bound to specific processor sets after creation. Jails can have an unrestricted (no duplicate protection, etc.) name in addition to the hostname. The jail name cannot be changed from within a jail and is considered to be used for management purposes or as audit-token in the future. DDB 'show jails' command was added to aid debugging. Proper compat support permits 32bit jail binaries to be used on 64bit systems to manage jails. Also backward compatibility was preserved where possible: for jail v1 syscalls, as well as with user space management utilities. Both jail as well as prison version were updated for the new features. A gap was intentionally left as the intermediate versions had been used by various patches floating around the last years. Bump __FreeBSD_version for the afore mentioned and in kernel changes. Special thanks to: - Pawel Jakub Dawidek (pjd) for his multi-IPv4 patches and Olivier Houchard (cognet) for initial single-IPv6 patches. - Jeff Roberson (jeff) and Randall Stewart (rrs) for their help, ideas and review on cpuset and SCTP support. - Robert Watson (rwatson) for lots and lots of help, discussions, suggestions and review of most of the patch at various stages. - John Baldwin (jhb) for his help. - Simon L. Nielsen (simon) as early adopter testing changes on cluster machines as well as all the testers and people who provided feedback the last months on freebsd-jail and other channels. - My employer, CK Software GmbH, for the support so I could work on this. Reviewed by: (see above) MFC after: 3 months (this is just so that I get the mail) X-MFC Before: 7.2-RELEASE if possible
* Bump date.pjd2007-04-051-1/+1
|
* Add security.jail.mount_allowed sysctl, which allows to mount andpjd2007-04-051-0/+10
| | | | | | | | | | | | | | | | | | unmount jail-friendly file systems from within a jail. Precisely it grants PRIV_VFS_MOUNT, PRIV_VFS_UNMOUNT and PRIV_VFS_MOUNT_NONUSER privileges for a jailed super-user. It is turned off by default. A jail-friendly file system is a file system which driver registers itself with VFCF_JAIL flag via VFS_SET(9) API. The lsvfs(1) command can be used to see which file systems are jail-friendly ones. There currently no jail-friendly file systems, ZFS will be the first one. In the future we may consider marking file systems like nullfs as jail-friendly. Reviewed by: rwatson
* Change mount_devfs reference to "mount -t devfs".rodrigc2006-11-211-2/+2
| | | | Reminded by: ru
* Markup fixes.ru2006-09-291-9/+11
|
* Use IP addresses out of "TEST-NET" (for use in documentation andbz2006-06-111-9/+9
| | | | | | example code) [RFC3330]. Reviewed by: simon
* Revert 1.73, since mounting devfs without a devfs ruleset inside asimon2006-05-281-1/+0
| | | | | | | jail is a very bad idea security wise. Approved by: trhodes (jcamou mentor) No response: jcamou
* Mention ruleset #4 (devfsrules_jail) in jail's man page.matteo2006-05-281-1/+3
| | | | MFC after: 3
* correct strtol(3) usage and style(9)matteo2006-05-121-4/+8
| | | | | Reviewed by: maxim MFC after: 2 weeks
* o Style(9) the previous commit a bit.maxim2006-05-111-13/+7
|
* Add the -s option to set jail's securelevel. This is useful for jails run ↵matteo2006-05-112-4/+26
| | | | | | | with non-root privileges. PR: bin/80242 MFC after: 2 weeks
* Use .Vt for struct xprisonmatteo2006-05-101-2/+4
| | | | Suggested by: keramida
* document security.jail.list sysctl in jail(8)matteo2006-05-081-1/+9
| | | | | PR: docs/96807 MFC after: 3
* o Document security.jail.jailed sysctl.maxim2006-05-031-1/+6
| | | | | | PR: docs/94711 Submitted by: Andreas Kohn MFC after: 2 weeks
* o Do not mangle current session user login name with jail -u|-U.maxim2006-04-161-1/+1
| | | | | | PR: bin/94730 Submitted by: Frank Behrens MFC after: 1 month
* Do `mount_devfs' when starting a jail.jcamou2006-03-161-0/+1
| | | | | | | PR: docs/86044 Noticed by: Dan Langille <dan@langille.org> Reviewed by: Jose Biskofski <jbiskofski@grmims.com> Approved by: trhodes (mentor)
* Add [-J jid_file] option to write out a JidFile, similar to a PidFile,philip2005-12-032-6/+30
| | | | | | | | | | containing the jailid, path, hostname, ip and the command used to start the jail. PR: misc/89883 Submitted by: L. Jason Godsey <lannygodsey -at- yahoo.com> Reviewed by: phk MFC after: 1 week
* Note that the jail setup example is meant to be fed to sh(1), not csh(1).keramida2005-10-261-3/+4
| | | | | | | PR: docs/87351 Submitted by: "Eli K. Breen" <bsd@unixforge.net> Approved by: simon, brooks MFC after: 3 days
* Add some more info about jail startup and shutdown.brueffer2005-08-071-7/+17
| | | | | Submitted by: Jeremie Le Hen <jeremie@le-hen.org> MFC after: 3 days
* Move DNS configuration before sendmail configuration, becausearved2005-07-251-4/+4
| | | | | | newaliases(1) may hang without proper DNS configuration. Approved by: brueffer
* Mention that it is possible to have jailsjcamou2005-07-201-0/+6
| | | | | | | | | | started at boot time if specified in /etc/rc.conf. PR: docs/81040 Submitted by: matteo Approved by: trhodes (mentor) MFC after: 1 week
* Markup fixes.ru2005-06-141-9/+6
| | | | Approved by: re (blanket)
* Update manual page after sysctl rename.pjd2005-06-091-13/+16
| | | | Corrected by: brueffer
* Document 'jid' keyword for ps(1) and '-j' option for pgrep(1)/pkill(1).pjd2005-05-281-5/+20
|
* Remove symblic link kernel->dev/null creation. We don't need it in 5.x/6.xpjd2005-05-141-2/+0
| | | | | | world (there is no /kernel file anymore). Reminded by: Isaac Levy presentation
* Fix spelling errors.joel2005-04-301-2/+2
| | | | Approved by: brueffer (mentor)
* Added the convenience "distribution" target which calls theru2005-02-271-2/+1
| | | | | | target of the same name from src/etc/Makefile with a proper environment, suitable to be used during upgrades and cross- builds.
* Add a new sysctl, "security.jail.chflags_allowed", which controls thecperciva2005-02-081-0/+9
| | | | | | | | | | | | | behaviour of chflags within a jail. If set to 0 (the default), then a jailed root user is treated as an unprivileged user; if set to 1, then a jailed root user is treated the same as an unjailed root user. This is necessary to allow "make installworld" to work inside a jail, since it attempts to manipulate the system immutable flag on certain files. Discussed with: csjp, rwatson MFC after: 2 weeks
* Fixed punctuation in xrefs.ru2005-01-211-1/+1
|
* Scheduled mdoc(7) sweep.ru2005-01-111-5/+3
|
* Initialize lcap and pwd to NULL. This allows a WARNS=6 clean build,delphij2004-11-172-3/+3
| | | | | | | | | hence bump it to 6. Note that the last commit message was not quite accurate. While the assumption exists in the code, it's not possible to have an uninitialized p there because if lflag is set when username is NULL then execution would be terminated earlier.
* The code path in main() dealing with lflag assumes that p wasdelphij2004-11-171-1/+1
| | | | | initialized with NULL, while it is not. So let's initialize it.
* Pass an array of gid_t rather than an array of int to getgroups().stefanf2004-10-021-1/+2
| | | | PR: 56646
* o Add -l option to jail(8) similar to su(1): before running jail'edmaxim2004-08-152-6/+50
| | | | | | | | | program under specific user's credentials, clean the environment and set only a few variables. PR: bin/70024 Submitted by: demon MFC after: 1 month
* Mechanically kill hard sentence breaks.ru2004-07-021-2/+4
|
* Prepare jail(8) utility for new functionality which will limitpjd2004-06-271-4/+6
| | | | | | seeing status of mounted file system for jailed processes. Pass full path of jail's root directory to the kernel. mount(8) utility is doing the same thing already.
* Markup nits.ru2004-06-051-7/+11
|
* Sentences should not start with conjunctions. Change "Because"csjp2004-06-011-2/+2
| | | | | | to "Since". Pointed out by: Ceri
* Add a warning note to security.jail.allow_raw_socketscsjp2004-06-011-1/+4
| | | | | | | | | | | | | | | about the risks of enabling raw sockets in prisons. Because raw sockets can be used to configure and interact with various network subsystems, extra caution should be used where privileged access to jails is given out to untrusted parties. As such, by default this option is disabled. A few others and I are currently auditing the kernel source code to ensure that the use of raw sockets by privledged prison users is safe. Approved by: bmilekic (mentor)
* o Implement -U flag: run command as user which exists only in jail.maxim2004-05-292-19/+40
| | | | | | | | | o getpwnam(3) returns NULL and does not set errno when the user does not exist. Bail out with "no such user" instead of "Unknown error: 0". PR: bin/67262 Submitted by: demon (-U flag) MFC after: 3 weeks
* Typos and nits.dannyboy2004-05-201-19/+19
|
* Document security.jail.getfsstatroot_only sysctl.pjd2004-05-201-0/+14
| | | | | Obtained from: rwatson's commit log Approved by: rwatson
* mdoc(7) cleanup for the last commit to this file.simon2004-05-041-3/+10
| | | | OK'ed by: bmilekic
* Ammend jail(8) man page to explain new sysctl for raw-socketsbmilekic2004-05-031-0/+7
| | | | | | inside jails, Christian's last submission. Submitted by: Christian S.J. Peron <maneo@bsdpro.com>
* Correct typo.le2004-02-061-1/+1
|
OpenPOWER on IntegriCloud