slackbuilds_ponce/system/cage
David Somero 59b663818a system/cage: Misc automated cleanups.
Signed-off-by: David Somero <xgizzmo@slackbuilds.org>
2010-06-04 01:15:14 -04:00
..
cage.info system/cage: Added to 13.0 repository 2010-05-13 01:00:41 +02:00
cage.SlackBuild system/cage: Misc automated cleanups. 2010-06-04 01:15:14 -04:00
README system/cage: Added to 13.0 repository 2010-05-13 01:00:41 +02:00
README.SLACKWARE system/cage: Added to 13.0 repository 2010-05-13 01:00:41 +02:00
slack-desc system/cage: Added to 13.0 repository 2010-05-13 01:00:41 +02:00

cage was wtitten to be a creator of unbreakable padded cells for untrusted
applications. It can be used to chroot programs that want to run as root.
For that to work though either sysvinit or the kernel need to be patched and
recompiled (instructions on how to go about this are included in /usr/doc).

However since filesystem capabilities are implemented it can also be used
as a 'su' command with inheritance support, similar to the 'capsh' command
from the libcap package (but featuring chroot support). See README.SLACKWARE