On Tue, 24 Oct 2006, Jeff Dike wrote:

> On Tue, Oct 24, 2006 at 10:35:22AM -0700, Christopher Marshall wrote:
>> Would running a UML instance from a user account with no priviledges
>> on the host be sufficient to prevent a root process controlled by a
>> malicious user running within the UML from taking any possible
>> advantage of the host?
>
> At most, the malicious user would be able to get whatever priviliges
> the user running the UML has (in your scenario, that would be none).
>
>> I realize that it is probably advisable (due to bugs not currently
>> known) to run the UML instance from within a chroot containing only
>> the UML kernel and its filesystem image and a few device nodes like
>> /dev/net/tun needed to bring up networking, but as far as you know,
>> is it *necessary* to do so?
>
> As far as I know, it's not.
>
>                               Jeff
>

Jeff,

     I justed wanted to say *thanks* for being such a cool project 
maintainer and being accessible. I have worked with another project 
(sorry, not saying which) and the maintainer is really hard to interact 
with or even get any attention from.

All,

     And *thanks* goes to all the other contributors as well. Open Source 
is great.

     Bill Stearns are you still out there? I just realized you taught 
one of my SANS security courses. Small world.

--
John P. Mitchell <[EMAIL PROTECTED]>

-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
User-mode-linux-user mailing list
User-mode-linux-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-user

Reply via email to