On Tue, May 26, 2009 at 1:08 PM, Boyd Stephen Smith Jr. <
b...@iguanasuicide.net> wrote:

> In <4a1c2c45.1c05d00a.3255.5...@mx.google.com>, Sthu Deus wrote:
> >Thank You for Your time and answer, Sylvain:
> >> Use a chroot (standard) or a vserver (search for vserver in debian
> >
> >AFAIK, it is not safe to use chroot - for an evil doer can logout from
> >chroot once it detects it.
>
> Escaping a good chroot is difficult as a non-root user.  However, I'm not
> sure it is worth worrying about.  There have been exploits to escape UML,
> VServer, Xen, KVM, and KQemu, too.
>
> Of course, chroot isn't really virtualization in the modern sense.  Xen,
> KVM, or VServer are.  I don't like VServer personally.  Xen has backing
> from
> Novell and KVM has backing from RedHat, so I'd choose one of those and go
> googling for a HOWTO.
> --
> Boyd Stephen Smith Jr.                   ,= ,-_-. =.
> b...@iguanasuicide.net                   ((_/)o o(\_))
> ICQ: 514984 YM/AIM: DaTwinkDaddy         `-'(. .)`-'
> http://iguanasuicide.net/                    \_/
>
>
OpenVZ is the best alternative for operating system level virtualization,
like Boyd I don't like VServer either.

BTW Boyd, Xen is backed up by Citrix, not Novell.  ;-)

KVM and Xen are hardware virtualization technologies.


-- 
"It is human nature to think wisely and act in an absurd fashion."

"Todo el desorden del mundo proviene de las profesiones mal o mediocremente
servidas"

Reply via email to