On Tuesday 08 March 2005 12:52, nils toedtmann wrote: > On Sat, Mar 05, 2005 at 06:30:55PM +0100, Blaisorblade wrote: > > On Thursday 03 March 2005 02:17, nils toedtmann wrote: > > > On Wed, Mar 02, 2005 at 12:35:23PM -0800, Jim Carter wrote: > > > > On Wed, 2 Mar 2005, Maarten wrote: > > > > > Out of curiosity, is a 'default' SKAS-enabled guest (and without > > > > > the host-fs kernel option) safe enough as a sandbox to let > > > > > untrusted users in, or are additional measures in order to really > > > > > secure it (or more paranoia ;-) ? Ie. how difficult is it to gain > > > > > access to the host OS from the UML guest?
This above is what I asked and along the way I often lost you all somewhat :-) So, I did not participate any further in the thread. But I want to thank all of you for enlightening me, and I will not trust user-mode-linux to shield the host OS from evildoers inside a UML guest. I saw some interesting suggestions and solutions here, but for now they exceed both my knowledge [of chroot environments] and my available time left... So that will have to be postponed. Thanks again! Maarten > > > > Here's my take on the issue. Do other list members have additional > > > > or contravening insights? > > > > [snip] ------------------------------------------------------- SF email is sponsored by - The IT Product Guide Read honest & candid reviews on hundreds of IT Products from real users. Discover which products truly live up to the hype. Start reading now. http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click _______________________________________________ User-mode-linux-user mailing list User-mode-linux-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/user-mode-linux-user