ports/127358: [new port] apache22 peruser mpm (slave) port

Jille Timmermans jille at quis.cx
Sat Sep 13 15:00:12 UTC 2008


>Number:         127358
>Category:       ports
>Synopsis:       [new port] apache22 peruser mpm (slave) port
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Sat Sep 13 15:00:10 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator:     Jille Timmermans
>Release:        FreeBSD 7.0-STABLE amd64
>Organization:
>Environment:
System: FreeBSD istud.quis.cx 7-STABLE FreeBSD


	
>Description:
	Peruser is an Apache 2 modules based on metuxmpm. The fundamental concept behind them is to run each apache child process as its own user and group, each handling its own set of virtual hosts. Peruser and recent metuxmpm releases can also chroot() apache processes. The result is a sane and secure web server environment for your users, without kludges like PHP's safe_mode.


	Original site: http://telana.com/peruser.php
	Patchsets: http://source.kood.ee/
	Mailinglist: peruser at telana.com (open for questions)
>How-To-Repeat:
	
>Fix:
	[SHAR] http://junk.quis.cx/hwGgcajE/peruser.sh
>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list