docs/92626: jail manpage should mention disabling some periodic scripts that do not make sense in a jail
Philip Hallstrom
philip at pjkh.com
Tue Jan 31 17:30:07 UTC 2006
>Number: 92626
>Category: docs
>Synopsis: jail manpage should mention disabling some periodic scripts that do not make sense in a jail
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-doc
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: change-request
>Submitter-Id: current-users
>Arrival-Date: Tue Jan 31 17:30:03 GMT 2006
>Closed-Date:
>Last-Modified:
>Originator: Philip Hallstrom
>Release: 6.0-STABLE
>Organization:
n/a
>Environment:
FreeBSD bravo.pjkh.com 6.0-STABLE FreeBSD 6.0-STABLE #1: Wed Jan 25 11:10:27 CST 2006 root at alpha.pjkh.com:/usr/obj/usr/src/sys/ALPHA i386
>Description:
I have recently setup a jail on 6.0-STABLE. When reviewing the daily periodic emails "security run output" and "daily run output" it contained the following:
ipfw: socket: Operation not permitted
ip6fw: socket: Protocol not supported
Network interface status:
netstat: kvm not available
ifnet: symbol not defined
I think it might be worth mentioning in the manpage when setting up a jail to add the following to /etc/periodic.conf:
daily_status_network_enable="NO"
daily_status_security_ipfwdenied_enable="NO"
daily_status_security_ipfdenied_enable="NO"
daily_status_security_pfdenied_enable="NO"
daily_status_security_ipfwlimit_enable="NO"
daily_status_security_ip6fwdenied_enable="NO"
daily_status_security_ipf6denied_enable="NO"
daily_status_security_ip6fwlimit_enable="NO"
This will stop the tests that are trying to run commands that aren't valid inside of a jail because they don't have access to those resources.
>How-To-Repeat:
Setup a full blown jail. Let it run over night. Examine the output of the periodic emails.
>Fix:
see above
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-doc
mailing list