Roscoe <[email protected]> writes:
> Sound like a good idea? Crap idea? Suggestions?

Not a bad idea.

Just a random thought: If spamming or abusing the internet connection
of the VPS is a problem, how about not providing outbound access at
all? People could easily tunnel their outgoing traffic back to their.
local system. For example

ssh -t -R 3218:proxy.at.some.edu:3128 your-vps.somewhere.example.com \
 sh -c 'http_proxy=http://localhost:3218/ elinks'

would start the elinks browser on the VPS but route its traffic over
ssh back to the client machine.

(You probably want to use network namespaces of linux to make sure
that each user can only access their own port forwardings..)
_______________________________________________
Discussion mailing list
[email protected]
https://mail.fsfeurope.org/mailman/listinfo/discussion

Reply via email to