On 6/27/07, Martin Albrecht <[EMAIL PROTECTED]> wrote:
> We cannot rely on DoS prevention systems elsewhere if the notebook is used for
> a denial of service attack it is William's responsibility.
>
> Thus, I vote for a heavily firewalled chroot:
>  * do all the anti-spoof, packet scrubbing stuff
>
>  * forbid any OUTGOING traffic
>  * allow a WHITELIST of hosts:ports (like sloane's database and such)
>  * allow DNS out (I'm afraid we have to do that)
>
>  * forbid any INCOMING traffic
>  * allow SSH in
>  * allow the SAGE notebook communication in

I agree with all this.

> Another thing: If I shoot myself in the foot 30 times (that is the number of
> users) I effectively vandalized the SAGE notebook? Ignore this if it doesn't
> make sense, I haven't actually tried to vandalize anything yet.

No, you're right, sort of.  You haven't vandalized it, you've denial of
serviced it temporarily, in that everybody else's sessions will be
automatically restarted.   I should probably map each user to
a single one of those 30 login names, so they can at most every
vandalize 1/30 of the other users.   Thoughts?  Here 30 can be
made arbitrarily large...

william

--~--~---------~--~----~------------~-------~--~----~
To post to this group, send email to sage-devel@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at http://groups.google.com/group/sage-devel
URLs: http://sage.scipy.org/sage/ and http://modular.math.washington.edu/sage/
-~----------~----~----~----~------~----~------~--~---

Reply via email to