Date: Sun, 17 Nov 1996 15:31:15 -0700 (MST) From: Digital Dreamer <dreamer@garrison.inetcan.net> To: "az.com" <yankee@lucy.az.com> Cc: freebsd-security@freebsd.org Subject: Re: grand alternatives to chroot, solution to the age-old root problem Message-ID: <Pine.LNX.3.91.961117152955.1880A-100000@garrison.inetcan.net> In-Reply-To: <Pine.BSF.3.91.961117133249.19647K-100000@lucy.az.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 17 Nov 1996, az.com wrote: > No longer do you have to worry about whether they have root or not - in > fact each user gets to be root! (in their own machine, of course ;) ) If > they want to hack, get fancy, reboot, etc. - its up to them - its *their* > system, not yours. > > If they blow out the virtual OS space because they gave their password out > to a grommet or made a mistake, you simply run a utility which checks and > repairs virtual file system's partitions and refreshes the virtual > 'environment's' OS from a template. Sounds nice, but kind of impractical. There's no unice (AFAIK) whose kernel could do this without essentially being rewritten. Besides, there's still the possibility of kernel bugs that would let you break out of your vm and get into that of others. dreamer
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.3.91.961117152955.1880A-100000>