Hi Mike, Serge,
>>> So, is there any way to do this ? I guess that SELinux/GR will offer
>>> some pointers to forbid root these actions, but are there any "easier"
>>> ways ??
>>>
>> Sounds like SELinux is the tool of choice for that.
>
> And if your concern is with the host's admins, not with exploited root
> apps on the host server, then selinux still won't help you.
Partially....my second question here on the list regarding TPM support
would be a great possibility to ensure and certifiy a certain state of
the Root-Server.
But to keep on track - are they any good howtos for SELinux/vserver
Oliver
-- Diese Nachricht wurde digital unterschrieben oliwel's public key: http://www.oliwel.de/oliwel.crt Basiszertifikat: http://www.ldv.ei.tum.de/page72
_______________________________________________
Vserver mailing list
Vserver@list.linux-vserver.org
http://list.linux-vserver.org/mailman/listinfo/vserver