On Wed, Apr 27, 2005 at 06:49:21PM +0200, Oliver Dietz wrote:
> Hi Oliver,
> 
> >>Would you give anyone (that you don't know realy good) root-access to a
> >>(correctly configured) vserver, when the host-system is a sensible
> >>productive system?
> >
> >As there are a lot of companys outside who sell vServer's on their
> >systems I think - yes you can ;)
> 
> ok, that a good point/answer :-))
> 
> >vServer has mulitple securitty features to prevent people from breaking
> >out of a context - I dont know if there is no way, but at least there is
> >no known one at the moment
> 
> I'm trying a few days now to get the infomarions from all the "papers" on 
> linux-vserver.org together ... but it's realy hard to find the "red line" 
> through all that ... so i'm not realy sure if i've done all correct and if 
> my vserver is secure (i'm no real linux-inside) isolated ...
> 
> Is there a tool (like testme.sh) that tests the common (maybe also 
> uncommon) possibilities of misconfigurations (like the capabilities and 
> chroot-exploids) from inside the VServer?

not yet, but sounds like something useful to me ...

any volunteers?

best,
Herbert

> Thanks!
> Oliver 
> 
> _______________________________________________
> Vserver mailing list
> Vserver@list.linux-vserver.org
> http://list.linux-vserver.org/mailman/listinfo/vserver
_______________________________________________
Vserver mailing list
Vserver@list.linux-vserver.org
http://list.linux-vserver.org/mailman/listinfo/vserver

Reply via email to