DH Hudan, Monday, December 19, 2005, 1:28:02 PM, you wrote:
HR> A. Karim wrote: >> On Thu, 15 Dec 2005, Hudan Ramadhona wrote: >> >>> setting msql nya udah jalan kok mas. >>> >>> tapi pas tail /var/log/mail.log, banyak pesan warning : >>> >>> warning: 4B25F53867: virtual_alias_maps map lookup problem for >>> [EMAIL PROTECTED] >>> Dec 15 17:16:43 TS postfix/pickup[4272]: warning: >>> maildrop/A9BF953853: Error writing message file >>> Dec 15 17:17:07 TS postfix/trivial-rewrite[4424]: warning: connect to >>> mysql server localhost: Can't connect to local MySQL server through >>> socket '/var/run/mysqld/mysqld.sock' (2) <===== mysql.sock nya ada >>> kok, tapi kok nga konek ya? >> >> >> mysqld.sock dan mysql.sock itu kan beda. >> kalo saya biasa bikin symlink saja mysql.sock ke mysqld.sock >> >> tp.. perlu di cermati juga, biasa kejadian postfix tdk bisa konek ke >> mysql karna postfix dalam keadaan chroot >> >> -- >> Duken >> >> HR> maksudnya dalam keadaan chroot apa ya mas? http://en.wikipedia.org/wiki/Chroot A chroot on Unix operating systems is an operation which changes the root directory. It affects only the current process and its children. "chroot" itself can refer to the chroot(2) system call or the chroot(8) wrapper program. A program that is re-rooted to another directory cannot name files outside that directory. This provides a convenient way to sandbox an untrusted, test or otherwise dangerous program. It is also a simple kind of jail mechanism. In practice, chrooting is complicated by programs expecting at startup to find scratch space, configuration files, device nodes and shared libraries at certain preset locations. To allow programs to spawn inside the chroot directory, it must be populated with a minimum set of these files, preferably carefully chosen so as not to allow unintended access to the outside system. Programs are allowed to carry open file descriptors (for files, pipelines and network connections) into the chroot, which can simplify jail design by making it unnecessary to leave working files inside the chroot directory. This also works as a simple capability system, in which the program is explicitly granted access to resources outside the chroot based on the descriptors it can carry in. -- Best regards, -avd Happy unBirthday to me us! http://www.avudz.cc/blog/index.php?comment=119