Re: CS Project

1999-09-12 Thread Dag-Erling Smorgrav
Chris Costello ch...@calldei.com writes: On Thu, Sep 09, 1999, Narvi wrote: It sounds like a FreeBSD VM, VM taken to mean virtual machine. Anybody in such a 'jar' would not notice (be able to notice) the existence of others at all. In Texas we call that a chroot. ITYM jail(2), which

RE: CS Project

1999-09-10 Thread Andrzej Bialecki
On Thu, 9 Sep 1999, Daniel O'Connor wrote: On 09-Sep-99 Jason Young wrote: After some thought, I think the mount option idea is best. I hadn't thought of that before. One might want to apply different procfs security policies to different mounts of procfs, especially in a jail()

RE: CS Project

1999-09-10 Thread Andrzej Bialecki
On Thu, 9 Sep 1999, Daniel O'Connor wrote: On 09-Sep-99 Jason Young wrote: After some thought, I think the mount option idea is best. I hadn't thought of that before. One might want to apply different procfs security policies to different mounts of procfs, especially in a jail()

RE: CS Project

1999-09-09 Thread Daniel O'Connor
On 09-Sep-99 Jason Young wrote: After some thought, I think the mount option idea is best. I hadn't thought of that before. One might want to apply different procfs security policies to different mounts of procfs, especially in a jail() situation. Good call. Yeah, you'd have to make

Re: CS Project

1999-09-09 Thread Chuck Robey
On Thu, 9 Sep 1999, Julian Elischer wrote: I think he wants something like an "inverted chroot" (you can see out but others can't see in? (into all facets, e.g. process stats, etc.) Then maybe he should begin by looking at the work Poul-Henning has done on jail(8) code? Is that what you're

Re: CS Project

1999-09-09 Thread Mike Pritchard
On Wed, Sep 08, 1999, Gustavo V G C Rios wrote: Dear gentleman, One clear example: No user(but only that ones previous allowed to) should be able to see other users process. This facility have to be done at kernel level, (that's what i think). Define "see". Access the memory?

Re: CS Project

1999-09-09 Thread Chris Costello
On Thu, Sep 09, 1999, Mike Pritchard wrote: I used to work somewhere where we didn't wany any of the users to know anything about any other groups of users processes. We did this by restricting ps to only show other procs that had the same primary group as the person executing ps. Root and

Re: CS Project

1999-09-09 Thread Jeroen Ruigrok/Asmodai
* Daniel O'Connor ([EMAIL PROTECTED]) [990909 07:15]: On 09-Sep-99 Gustavo V G C Rios wrote: I would not be able to see any other proccess which i am not the owner, top would indicated, only 8 proccess, for this current scenario. Linux already have such a facility! Hack ps and turn off

Re: CS Project

1999-09-09 Thread Narvi
On Thu, 9 Sep 1999, Julian Elischer wrote: I think he wants something like an "inverted chroot" (you can see out but others can't see in? (into all facets, e.g. process stats, etc.) It sounds like a "FreeBSD VM", VM taken to mean virtual machine. Anybody in such a 'jar' would not notice

Re: CS Project

1999-09-09 Thread Chris Costello
On Thu, Sep 09, 1999, Narvi wrote: It sounds like a "FreeBSD VM", VM taken to mean virtual machine. Anybody in such a 'jar' would not notice (be able to notice) the existence of others at all. With somedata hiding and given file systems mounted only in such a 'jar' the ones in it would

RE: CS Project

1999-09-09 Thread Jason Young
-Original Message- From: owner-freebsd-hack...@freebsd.org [mailto:owner-freebsd-hack...@freebsd.org]on Behalf Of Daniel O'Connor Sent: Wednesday, September 08, 1999 9:05 PM To: Gustavo V G C Rios Cc: freebsd-hackers@FreeBSD.ORG; ch...@calldei.com Subject: Re: CS Project On 09

RE: CS Project

1999-09-09 Thread Daniel O'Connor
or operator or a special new group would be good for things that must see all the processes. Like this: Well.. that doesn't sound *too* complex either. Would make an interesting CS project :) queried by an unpriveleged user (chdir to /proc/$PIDEXISTSBUTNOTYOURS would return ENOENT instead of EACCES

RE: CS Project

1999-09-09 Thread Jason Young
and do it. Then again, somebody DID ask for a CS project. :) Heh :) Say, when is babelfish going to put up an English-diff(1) translator? Would make things a hell of a lot easier around here! : Jason Young accessUS Chief Network Engineer To Unsubscribe: send mail to majord...@freebsd.org

RE: CS Project

1999-09-09 Thread Jason Young
Some further thoughts before I doze off: allowed to. This should be controlled by sysctls like (placement based on nfs and ffs sysctl placement precedent): Or even a mount option to procfs :) After some thought, I think the mount option idea is best. I hadn't thought of that before.

RE: CS Project

1999-09-09 Thread Daniel O'Connor
On 09-Sep-99 Jason Young wrote: After some thought, I think the mount option idea is best. I hadn't thought of that before. One might want to apply different procfs security policies to different mounts of procfs, especially in a jail() situation. Good call. Yeah, you'd have to make sure

Re: CS Project

1999-09-09 Thread Julian Elischer
I think he wants something like an inverted chroot (you can see out but others can't see in? (into all facets, e.g. process stats, etc.) julian On Wed, 8 Sep 1999, Chuck Robey wrote: On Wed, 8 Sep 1999, Gustavo V G C Rios wrote: Dear gentleman, i am a computer science student, and

Re: CS Project

1999-09-09 Thread Chuck Robey
On Thu, 9 Sep 1999, Julian Elischer wrote: I think he wants something like an inverted chroot (you can see out but others can't see in? (into all facets, e.g. process stats, etc.) Then maybe he should begin by looking at the work Poul-Henning has done on jail(8) code? Is that what you're

Re: CS Project

1999-09-09 Thread Mike Pritchard
On Wed, Sep 08, 1999, Gustavo V G C Rios wrote: Dear gentleman, One clear example: No user(but only that ones previous allowed to) should be able to see other users process. This facility have to be done at kernel level, (that's what i think). Define see. Access the memory?

Re: CS Project

1999-09-09 Thread Chris Costello
On Thu, Sep 09, 1999, Mike Pritchard wrote: I used to work somewhere where we didn't wany any of the users to know anything about any other groups of users processes. We did this by restricting ps to only show other procs that had the same primary group as the person executing ps. Root and

Re: CS Project

1999-09-09 Thread Jeroen Ruigrok/Asmodai
* Daniel O'Connor (docon...@gsoft.com.au) [990909 07:15]: On 09-Sep-99 Gustavo V G C Rios wrote: I would not be able to see any other proccess which i am not the owner, top would indicated, only 8 proccess, for this current scenario. Linux already have such a facility! Hack ps and turn

Re: CS Project

1999-09-09 Thread Narvi
On Thu, 9 Sep 1999, Julian Elischer wrote: I think he wants something like an inverted chroot (you can see out but others can't see in? (into all facets, e.g. process stats, etc.) It sounds like a FreeBSD VM, VM taken to mean virtual machine. Anybody in such a 'jar' would not notice (be

Re: CS Project

1999-09-09 Thread Chris Costello
On Thu, Sep 09, 1999, Narvi wrote: It sounds like a FreeBSD VM, VM taken to mean virtual machine. Anybody in such a 'jar' would not notice (be able to notice) the existence of others at all. With somedata hiding and given file systems mounted only in such a 'jar' the ones in it would have

CS Project

1999-09-08 Thread Gustavo V G C Rios
Dear gentleman, i am a computer science student, and this semester i had to began my project to get graduated. After looking for some interesting topics on many sources, one rised up: Privacity on Shared Environments. My ideia is to add system facilities to improve privacity for users on shared

Re: CS Project

1999-09-08 Thread Chris Costello
On Wed, Sep 08, 1999, Gustavo V G C Rios wrote: Dear gentleman, One clear example: No user(but only that ones previous allowed to) should be able to see other users process. This facility have to be done at kernel level, (that's what i think). Define "see". Access the memory? See that

Re: CS Project

1999-09-08 Thread Gustavo V G C Rios
Chris Costello wrote: On Wed, Sep 08, 1999, Gustavo V G C Rios wrote: Dear gentleman, One clear example: No user(but only that ones previous allowed to) should be able to see other users process. This facility have to be done at kernel level, (that's what i think). Define

Re: CS Project

1999-09-08 Thread Gustavo V G C Rios
Gustavo V G C Rios wrote: After changes made by me: I would be able to see any other proccess which i am not the owner, top would not be (there was a mistaken in the sentece above, it was in lack of "not" ) would indicated, only 8 proccess, for this current

Re: CS Project

1999-09-08 Thread Chris Costello
On Wed, Sep 08, 1999, Gustavo V G C Rios wrote: I would be able to see any other proccess which i am not the owner, top would indicated, only 8 proccess, for this current scenario. do you understand now, what i meant? Linux already have such a facility! I don't believe such a facility

Re: CS Project

1999-09-08 Thread Daniel O'Connor
On 09-Sep-99 Gustavo V G C Rios wrote: I would be able to see any other proccess which i am not the owner, top would not be (there was a mistaken in the sentece above, it was in lack of "not" ) would indicated, only 8 proccess, for this current scenario.

RE: CS Project

1999-09-08 Thread Daniel O'Connor
or operator or a special new group would be good for things that must see all the processes. Like this: Well.. that doesn't sound *too* complex either. Would make an interesting CS project :) queried by an unpriveleged user (chdir to /proc/$PIDEXISTSBUTNOTYOURS would return ENOENT instead

RE: CS Project

1999-09-08 Thread Jason Young
and do it. Then again, somebody DID ask for a CS project. :) Heh :) Say, when is babelfish going to put up an English-diff(1) translator? Would make things a hell of a lot easier around here! : Jason Young accessUS Chief Network Engineer To Unsubscribe: send mail to [EMAIL PROTECTED

RE: CS Project

1999-09-08 Thread Jason Young
Some further thoughts before I doze off: allowed to. This should be controlled by sysctls like (placement based on nfs and ffs sysctl placement precedent): Or even a mount option to procfs :) After some thought, I think the mount option idea is best. I hadn't thought of that before.

CS Project

1999-09-08 Thread Gustavo V G C Rios
Dear gentleman, i am a computer science student, and this semester i had to began my project to get graduated. After looking for some interesting topics on many sources, one rised up: Privacity on Shared Environments. My ideia is to add system facilities to improve privacity for users on shared

Re: CS Project

1999-09-08 Thread Chris Costello
On Wed, Sep 08, 1999, Gustavo V G C Rios wrote: Dear gentleman, One clear example: No user(but only that ones previous allowed to) should be able to see other users process. This facility have to be done at kernel level, (that's what i think). Define see. Access the memory? See that it

Re: CS Project

1999-09-08 Thread Gustavo V G C Rios
Chris Costello wrote: On Wed, Sep 08, 1999, Gustavo V G C Rios wrote: Dear gentleman, One clear example: No user(but only that ones previous allowed to) should be able to see other users process. This facility have to be done at kernel level, (that's what i think). Define see.

Re: CS Project

1999-09-08 Thread Gustavo V G C Rios
Gustavo V G C Rios wrote: After changes made by me: I would be able to see any other proccess which i am not the owner, top would not be (there was a mistaken in the sentece above, it was in lack of not ) would indicated, only 8 proccess, for this current

Re: CS Project

1999-09-08 Thread Chris Costello
On Wed, Sep 08, 1999, Gustavo V G C Rios wrote: I would be able to see any other proccess which i am not the owner, top would indicated, only 8 proccess, for this current scenario. do you understand now, what i meant? Linux already have such a facility! I don't believe such a facility

Re: CS Project

1999-09-08 Thread Daniel O'Connor
On 09-Sep-99 Gustavo V G C Rios wrote: I would be able to see any other proccess which i am not the owner, top would not be (there was a mistaken in the sentece above, it was in lack of not ) would indicated, only 8 proccess, for this current scenario.

Re: CS Project

1999-09-08 Thread Chuck Robey
On Wed, 8 Sep 1999, Gustavo V G C Rios wrote: Dear gentleman, i am a computer science student, and this semester i had to began my project to get graduated. After looking for some interesting topics on many sources, one rised up: Privacity on Shared Environments. My ideia is to add