Confine services in a limited environment
Compartment was designed to allow safe execution of priviliged and/or
untrusted executables and services. It has got all possible features
included, which can be used to minimize the risk of a trojanized or
SuSE secure compartment
(c) 2000 by Marc Heuse <email@example.com>
This tool was written to securely run untrusted services and programs.
It has all options needed to make the impact of an successful hacker
attempt on a service as small as possible.
Type "make install" (this will also compile the program)
The binary "compartment" w
compartment - secure program/service wrapper
compartment [--cap CAPSET] [--chroot PATH] [--user USER]
[--group GROUP] [--init PROGRAM] [--verbose] [--quiet]
The SuSE Secure Compartment was designed to allow safe execu‐
v1.1 25.02.01 (final) -> SuSE 7.1
* Added a #define which is needed for 2.4 kernels
v1.0 24.04.00 (final) -> SuSE 7.0
-> I think this tool is perfect now, just some more examples are
missing - maybe some people might send some in? See the end of
the README for an example for bind8 and squid!
* Added some more tips and information to the README
* Added squid2 example.
* when the 2.4 kernel gets out, I'll add the special function call where
capabilities can be saved
Browse inside compartment-1.1-0.2.el5.rf.x86_64.rpm
Results 1 - 1 of 1Search over 15 billion files
© 1997-2017 FileWatcher.com