Roscoe <[email protected]> writes: > Sound like a good idea? Crap idea? Suggestions?
Not a bad idea. Just a random thought: If spamming or abusing the internet connection of the VPS is a problem, how about not providing outbound access at all? People could easily tunnel their outgoing traffic back to their. local system. For example ssh -t -R 3218:proxy.at.some.edu:3128 your-vps.somewhere.example.com \ sh -c 'http_proxy=http://localhost:3218/ elinks' would start the elinks browser on the VPS but route its traffic over ssh back to the client machine. (You probably want to use network namespaces of linux to make sure that each user can only access their own port forwardings..) _______________________________________________ Discussion mailing list [email protected] https://mail.fsfeurope.org/mailman/listinfo/discussion
