[EMAIL PROTECTED] writes in gmane.linux.network,gmane.linux.kernel: > The following patches create a private "network namespace" for use > within containers. This is intended for use with system containers > like vserver, but might also be useful for restricting individual > applications' access to the network stack. > > These patches isolate traffic inside the network namespace. The > network ressources, the incoming and the outgoing packets are > identified to be related to a namespace. > > It hides network resource not contained in the current namespace, but > still allows administration of the network with normal commands like > ifconfig. > > It applies to the kernel version 2.6.17-rc6-mm1 > > It provides the following: > ------------------------- > - when an application unshares its network namespace, it looses its > view of all network devices by default. The administrator can > choose to make any devices to become visible again. The container > then gains a view to the device but without the ip address > configured on it. It is up to the container administrator to use > ifconfig or ip command to setup a new ip address. This ip address > is only visible inside the container.
Do other namespaces work differently ? When namespace is unshared, it has initially the same resources (for example compare to CLONE_NEWNS) > - the loopback is isolated inside the container and it is not > possible to communicate between containers via the > loopback. > > - several containers can have an application bind to the same > address:port without conflicting. That of course be problem, if initially unshared namespace shares same resources. / Kari Hurtta - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html