Hi Mike, Serge,

So, is there any way to do this ? I guess that SELinux/GR will offer some pointers to forbid root these actions, but are there any "easier" ways ??

Sounds like SELinux is the tool of choice for that.

And if your concern is with the host's admins, not with exploited root
apps on the host server, then selinux still won't help you.

Partially....my second question here on the list regarding TPM support would be a great possibility to ensure and certifiy a certain state of the Root-Server.

But to keep on track - are they any good howtos for SELinux/vserver

Oliver
--
Diese Nachricht wurde digital unterschrieben
oliwel's public key: http://www.oliwel.de/oliwel.crt
Basiszertifikat: http://www.ldv.ei.tum.de/page72

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Vserver mailing list
Vserver@list.linux-vserver.org
http://list.linux-vserver.org/mailman/listinfo/vserver

Reply via email to