Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Jan 2001 17:44:06 +0100
From:      Roelof Osinga <roelof@nisser.com>
To:        ports@freebsd.org
Subject:   CFS (security/cfs) question
Message-ID:  <3A7057D6.4A84CBE3@nisser.com>

next in thread | raw e-mail | index | archive | help
The security/cfs comes, of course, with the original tarball.
Therein resides a file named README.install, amongst others.

Here we can read:

4) Create the cfs bootstrap mount point:
        # mkdir /null
        # chmod 0 /null

5) Add this line to /etc/exports:
        /null localhost
...
6) mkdir /crypt (or whatever you want to call the cfs mount point).

Since the 'make install' doesn't it follows I should. I also checked
http://www.freebsddiary.org/encrypted-fs.html where is said to put
'/var/tmp localhost' in /etc/exports.

I don't think that's as good since, say, vi uses it in times
of need (vi.recover).

Still, it makes me curious. Is there something to be said *against*
the /null with mode 0 tactic? A google search didn't deliver, nor
could I find much in the mailarchives. Thus I'm asking here <g>.

Roelof

-- 
Home is where the (@) http://eboa.com/ is.
Nisser home -- http://nl.nisser.com/


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3A7057D6.4A84CBE3>