public inbox for gentoo-portage-dev@lists.gentoo.org
 help / color / mirror / Atom feed
Search results ordered by [date|relevance]  view[summary|nested|Atom feed]
thread overview below | download: 
* Re: [gentoo-portage-dev] [PATCH] Support escaping network-sandbox through SOCKSv5 proxy
  @ 2015-01-25 14:01 99% ` Michał Górny
  0 siblings, 0 replies; 1+ results
From: Michał Górny @ 2015-01-25 14:01 UTC (permalink / raw
  To: gentoo-portage-dev

[-- Attachment #1: Type: text/plain, Size: 752 bytes --]

Dnia 2015-01-25, o godz. 12:29:54
Michał Górny <mgorny@gentoo.org> napisał(a):

> Add a minimal SOCKSv5-over-UNIX-socket proxy to Portage, and start it
> whenever ebuilds are started with network-sandbox enabled. Pass the
> socket address in PORTAGE_SOCKS5_PROXY and DISTCC_SOCKS_PROXY variables.
> The proxy can be used to escape the network sandbox whenever network
> access is really desired, e.g. in distcc.
> 
> The proxy currently supports IPv4 only, and does not report bound
> address (reports 0.0.0.0:0). No authentication is supported (UNIX
> sockets provide a security layer).

Resubmitted with a number of fixes as:

[PATCH v2] Support escaping network-sandbox through SOCKSv5 proxy

-- 
Best regards,
Michał Górny

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 949 bytes --]

^ permalink raw reply	[relevance 99%]

Results 1-1 of 1 | reverse | options above
-- pct% links below jump to the message on this page, permalinks otherwise --
2015-01-25 11:29     [gentoo-portage-dev] [PATCH] Support escaping network-sandbox through SOCKSv5 proxy Michał Górny
2015-01-25 14:01 99% ` Michał Górny

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox