On Sun, Apr 12, 2015 at 2:33 PM, Felix von Leitner
wrote:
>> What you're describing should work correctly (it's part of the
>> regression test suite we use). So, given that, I'd love to get to the
>> bottom of what you're seeing. Do you have a URL to your code? What
>> architecture are you
On Sun, Apr 12, 2015 at 2:33 PM, Felix von Leitner
felix-linuxker...@fefe.de wrote:
What you're describing should work correctly (it's part of the
regression test suite we use). So, given that, I'd love to get to the
bottom of what you're seeing. Do you have a URL to your code? What
> What you're describing should work correctly (it's part of the
> regression test suite we use). So, given that, I'd love to get to the
> bottom of what you're seeing. Do you have a URL to your code? What
> architecture are you running on?
Well, I must be doing something wrong then.
I extracted
What you're describing should work correctly (it's part of the
regression test suite we use). So, given that, I'd love to get to the
bottom of what you're seeing. Do you have a URL to your code? What
architecture are you running on?
Well, I must be doing something wrong then.
I extracted a
On Thu, Mar 26, 2015 at 11:39 PM, Richard Weinberger
wrote:
> Cc'ing seccomp folks.
>
> On Fri, Mar 27, 2015 at 6:56 AM, Felix von Leitner
> wrote:
>> Hi,
>>
>> I have had some great success with seccomp-filter a while ago, so I
>> decided to use it to add some defense in depth to a ping program
On Thu, Mar 26, 2015 at 11:39 PM, Richard Weinberger
richard.weinber...@gmail.com wrote:
Cc'ing seccomp folks.
On Fri, Mar 27, 2015 at 6:56 AM, Felix von Leitner
felix-linuxker...@fefe.de wrote:
Hi,
I have had some great success with seccomp-filter a while ago, so I
decided to use it to
Cc'ing seccomp folks.
On Fri, Mar 27, 2015 at 6:56 AM, Felix von Leitner
wrote:
> Hi,
>
> I have had some great success with seccomp-filter a while ago, so I
> decided to use it to add some defense in depth to a ping program I wrote.
>
> The premise is, like for all ping programs I assume, that
Hi,
I have had some great success with seccomp-filter a while ago, so I
decided to use it to add some defense in depth to a ping program I wrote.
The premise is, like for all ping programs I assume, that it starts
setuid root, gets a raw socket, drops privileges, parses the command
line,
Hi,
I have had some great success with seccomp-filter a while ago, so I
decided to use it to add some defense in depth to a ping program I wrote.
The premise is, like for all ping programs I assume, that it starts
setuid root, gets a raw socket, drops privileges, parses the command
line,
Cc'ing seccomp folks.
On Fri, Mar 27, 2015 at 6:56 AM, Felix von Leitner
felix-linuxker...@fefe.de wrote:
Hi,
I have had some great success with seccomp-filter a while ago, so I
decided to use it to add some defense in depth to a ping program I wrote.
The premise is, like for all ping
10 matches
Mail list logo