On Tuesday 08 March 2005 12:52, nils toedtmann wrote:
> On Sat, Mar 05, 2005 at 06:30:55PM +0100, Blaisorblade wrote:
> > On Thursday 03 March 2005 02:17, nils toedtmann wrote:
> > > On Wed, Mar 02, 2005 at 12:35:23PM -0800, Jim Carter wrote:
> > > > On Wed, 2 Mar 2005, Maarten wrote:
> > > > > Out of curiosity, is a 'default' SKAS-enabled guest (and without
> > > > > the host-fs kernel option) safe enough as a sandbox to let
> > > > > untrusted users in, or are additional measures in order to really
> > > > > secure it (or more paranoia ;-) ? Ie. how difficult is it to gain
> > > > > access to the host OS from the UML guest?

This above is what I asked and along the way I often lost you all somewhat :-)
So, I did not participate any further in the thread. But I want to thank all 
of you for enlightening me, and I will not trust user-mode-linux to shield 
the host OS from evildoers inside a UML guest.
I saw some interesting suggestions and solutions here, but for now they exceed 
both my knowledge [of chroot environments] and my available time left...
So that will have to be postponed.

Thanks again!
Maarten

> > > > Here's my take on the issue.  Do other list members have additional
> > > > or contravening insights?
> > > >

[snip]




-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click
_______________________________________________
User-mode-linux-user mailing list
User-mode-linux-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-user

Reply via email to