"import statically linked tools (using ports ...)"
- what does this mean ? A cracker can run arbitary code as the uml
user running the uml (inside the chroot). Are you then suggesting he
could use exploitable daemons running on the host to obtain additional
"tools" within the
# Note that this only becomes /dev on the real filesystem if udev's scripts
# are used; which they will be, but it's worth pointing out
tmpfs_size="10M"
mount -t tmpfs -o size=$tmpfs_size,mode=0755 udev /dev
> /dev/.initramfs-tools
mkdir /dev/.initramfs
mknod /dev/c
nux-2.6.18.1-bb2
Nicholas> initrd=/boot/initrd.img-2.6.18.1-bb2\ umid=base6.10 \
Nicholas> con=pts con0=fd:0,fd:1\ ubd0=b.img \
Have you tried using the user mode linux from Debian testing instead
(e.g 2.6.18-1um2) - thats what were using currently although without
initrd ?
Sincerely,