Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 13 Sep 2008 16:26:18 +0200 (CEST)
From:      Jille Timmermans <jille@quis.cx>
To:        FreeBSD-gnats-submit@FreeBSD.org
Cc:        Clement Laforet <clement@FreeBSD.org>
Subject:   ports/127358: [new port] apache22 peruser mpm (slave) port
Message-ID:  <20080913142618.A2F5E5C1E@istud.quis.cx>
Resent-Message-ID: <200809131500.m8DF0BE3035781@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         127358
>Category:       ports
>Synopsis:       [new port] apache22 peruser mpm (slave) port
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Sat Sep 13 15:00:10 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator:     Jille Timmermans
>Release:        FreeBSD 7.0-STABLE amd64
>Organization:
>Environment:
System: FreeBSD istud.quis.cx 7-STABLE FreeBSD


	
>Description:
	Peruser is an Apache 2 modules based on metuxmpm. The fundamental concept behind them is to run each apache child process as its own user and group, each handling its own set of virtual hosts. Peruser and recent metuxmpm releases can also chroot() apache processes. The result is a sane and secure web server environment for your users, without kludges like PHP's safe_mode.


	Original site: http://telana.com/peruser.php
	Patchsets: http://source.kood.ee/
	Mailinglist: peruser@telana.com (open for questions)
>How-To-Repeat:
	
>Fix:
	[SHAR] http://junk.quis.cx/hwGgcajE/peruser.sh
>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080913142618.A2F5E5C1E>