Quoting Oliver Welter ([EMAIL PROTECTED]):
> Hi Mike, Serge,
>
> >>>So, is there any way to do this ? I guess that SELinux/GR will offer
> >>>some pointers to forbid root these actions, but are there any "easier"
> >>>ways ??
> >>>
> >>Sounds like SELinux is the tool of choice for that.
> >
> >A
> "open-up-vservers-like-cracked-eggs.ko"?
That sounds interesting - where do I get that one from ;-)
--
Sebastian "tokkee" Harl
GnuPG-ID: 0x8501C7FC
http://tokkee.org/
signature.asc
Description: Digital signature
___
Vserver mailing list
Vserver@li
Quoting Eugen Leitl ([EMAIL PROTECTED]):
> On Tue, Apr 25, 2006 at 08:25:37PM +1000, Tony Lewis wrote:
>
> > I think this would be a valuable addition to vservers. One of the risks
> > of "renting" a virtual server (pick your flavour) is that you're not
> > safe from the hosting sysadmin. If v
On Tue, Apr 25, 2006 at 08:25:37PM +1000, Tony Lewis wrote:
> I think this would be a valuable addition to vservers. One of the risks
> of "renting" a virtual server (pick your flavour) is that you're not
> safe from the hosting sysadmin. If vservers could offer something like
You are never
Herbert Poetzl wrote:
On Mon, Apr 24, 2006 at 08:02:43AM +0200, Oliver Welter wrote:
So, is there any way to do this?
definitely, if you plan to pursue this direction,
please contact me and I will see what I can do.
I think this would be a valuable addition to vservers. One of t
Hi there,
> Q: Is there a way to prevent that a superuser on the host system can
Well, usually one characteristic of a superuser is the right to do
_everything_. Even if you use something like SELinux or whatever, most
superusers have physical access to their machines in one way or another.
IMHO
On Mon, Apr 24, 2006 at 08:02:43AM +0200, Oliver Welter wrote:
> Hi Folks,
>
> this might be a strange question for some of you as it is more an
> academical interesst, but I hope you can help me out ;)
>
> Q: Is there a way to prevent that a superuser on the host system can
>
> * see process o
Hi Mike, Serge,
So, is there any way to do this ? I guess that SELinux/GR will offer
some pointers to forbid root these actions, but are there any "easier"
ways ??
Sounds like SELinux is the tool of choice for that.
And if your concern is with the host's admins, not with exploited root
app
Quoting Michael S. Zick ([EMAIL PROTECTED]):
> On Mon April 24 2006 01:02, Oliver Welter wrote:
> > Hi Folks,
> >
> > this might be a strange question for some of you as it is more an
> > academical interesst, but I hope you can help me out ;)
> >
> > Q: Is there a way to prevent that a superuse
On Mon April 24 2006 01:02, Oliver Welter wrote:
> Hi Folks,
>
> this might be a strange question for some of you as it is more an
> academical interesst, but I hope you can help me out ;)
>
> Q: Is there a way to prevent that a superuser on the host system can
>
> * see process of a guest
> *
Hi Folks,
this might be a strange question for some of you as it is more an
academical interesst, but I hope you can help me out ;)
Q: Is there a way to prevent that a superuser on the host system can
* see process of a guest
* enter a guest
* receive any other valuable info from the guest
T
11 matches
Mail list logo