DH Hudan,

Monday, December 19, 2005, 1:28:02 PM, you wrote:

HR> A. Karim wrote:

>> On Thu, 15 Dec 2005, Hudan Ramadhona wrote:
>>
>>> setting msql nya udah jalan kok mas.
>>>
>>> tapi pas tail /var/log/mail.log, banyak pesan warning :
>>>
>>> warning: 4B25F53867: virtual_alias_maps map lookup problem for 
>>> [EMAIL PROTECTED]
>>> Dec 15 17:16:43 TS postfix/pickup[4272]: warning: 
>>> maildrop/A9BF953853: Error writing message file
>>> Dec 15 17:17:07 TS postfix/trivial-rewrite[4424]: warning: connect to
>>> mysql server localhost: Can't connect to local MySQL server through
>>> socket '/var/run/mysqld/mysqld.sock' (2)   <=====  mysql.sock nya ada
>>> kok, tapi kok nga konek ya?
>>
>>
>> mysqld.sock dan mysql.sock itu kan beda.
>> kalo saya biasa bikin symlink saja mysql.sock ke mysqld.sock
>>
>> tp.. perlu di cermati juga, biasa kejadian postfix tdk bisa konek ke
>> mysql karna postfix dalam keadaan chroot
>>
>> -- 
>> Duken
>>
>>
HR> maksudnya dalam keadaan chroot apa ya mas?

http://en.wikipedia.org/wiki/Chroot

A chroot on Unix operating systems is an operation which changes the root 
directory. It affects only the current process and its children. "chroot" 
itself can refer to the chroot(2) system call or the chroot(8) wrapper program.

A program that is re-rooted to another directory cannot name files outside that 
directory. This provides a convenient way to sandbox an untrusted, test or 
otherwise dangerous program. It is also a simple kind of jail mechanism.

In practice, chrooting is complicated by programs expecting at startup to find 
scratch space, configuration files, device nodes and shared libraries at 
certain preset locations. To allow programs to spawn inside the chroot 
directory, it must be populated with a minimum set of these files, preferably 
carefully chosen so as not to allow unintended access to the outside system.

Programs are allowed to carry open file descriptors (for files, pipelines and 
network connections) into the chroot, which can simplify jail design by making 
it unnecessary to leave working files inside the chroot directory. This also 
works as a simple capability system, in which the program is explicitly granted 
access to resources outside the chroot based on the descriptors it can carry in.


-- 
Best regards,
-avd
Happy unBirthday to me us!
http://www.avudz.cc/blog/index.php?comment=119

Reply via email to