On Tue, Oct 29, 2013 at 02:06:48PM -0400, Gabriel Guzman wrote:
> On 10/29, Theo de Raadt wrote:
> > The /dev/*random nodes are not specified in any standard, furthermore
> > once you get into chroot all bets are off (like you discovered).
> >
> > >This allows the program to work, but I'm wonderi
On 10/29, Theo de Raadt wrote:
> >I have a web program that attempts to access /dev/urandom from within the
> >/var/www chroot. Based on archive searches and googling, I've removed
> >the nodev flag from that mount and have created the random devices in
> >/var/www/dev/*
>
> So basically remov
>I have a web program that attempts to access /dev/urandom from within the
>/var/www chroot. Based on archive searches and googling, I've removed
>the nodev flag from that mount and have created the random devices in
>/var/www/dev/*
So basically remove a layer of security. Awesome. See what
Hello Misc,
I have a web program that attempts to access /dev/urandom from within the
/var/www chroot. Based on archive searches and googling, I've removed
the nodev flag from that mount and have created the random devices in
/var/www/dev/*
This allows the program to work, but I'm wondering
4 matches
Mail list logo