that's one of the reasons i patch the vserver kernel with grsec too. also you get PAX (aslr, mprotect stuff,...) features (www.grsecurity.net)

which makes it extremely hard to write to /dev/kmem, /dev/mem, it hides "dangerous" addresses to make exploitation harder, etc...

if you want enhanced security and you know something about grsecurity (which means, you know how to secure a box): http://people.linux-vserver.org/~harry

there you'll find the info you need. since this is ... well... personal choice in what to enable/disable, you're not gonna find this together with some distro. nevertheless, i include example configs (for dell and HP servers at work)

good luck with it :)

Martin wrote:
At the risk of sounding ungreatful for all of the hard work done on
vserver - what is the 'use case' for this feature?  As I understand it
there is nothing to keep the host from playing with /dev/kmem or
otherwise tampering with the kernel, so I can't see how a feature like
this will provide any strong guarentees; unless heirarchies of contexts
(which would be extreemly cool) are planned.  Or is it just intended as
a 'speed bump' / politeness feature?
--
harry
aka Rik Bobbaers

K.U.Leuven - LUDIT          -=- Tel: +32 485 52 71 50
[EMAIL PROTECTED] -=- http://people.linux-vserver.org/~harry

Nobody notices when things go right.

Disclaimer: http://www.kuleuven.be/cwis/email_disclaimer.htm

_______________________________________________
Vserver mailing list
[email protected]
http://list.linux-vserver.org/mailman/listinfo/vserver

Reply via email to