Thanks everyone,

Zones: I have been reading some of the documentation, but the requirement that 
each customer/zone needs own IP feels too "bloated". There are already half a 
million customers in LDAP, and even though the load on CGI and FTP servers is 
only a fraction of that, it feels unwieldy.  Would I then setup some kind of 
DHCP to automatically assign an IP and Zone when customers SSH logins 
(actually, I can probably not trigger Zones on SSH when I think about it, but 
would need to pre-create Zones for customers to use)

Although Zones would fix the process/username information-leak, (like BSD's 
security:curtain / ps_showallprocs) I think what I need to focus on is stopping 
disk access into other customers directories.  Zones could probably fix that by 
only mounting the customers directory (further down the tree) as opposed to 
"/export/" top-level mount.


OpenSSH chroot: As far as I understand this feature, from reading the sources, 
it appears to only work with scp and sftp. Not for ssh logins. 
If I was to enable it for ssh logins, I would have to "remount" the 
system-files inside the users directory. Any ways around that? Can you "open" 
/usr access before calling chroot() to get around it? Or can I loopback mount 
/usr "cheaply" in Solaris? (by /usr I mean all other required directories 
too...)


kernel module: I don't really have anyone around me that I can chat to about 
this (and who can then tell me 'that is just crazy') but having read:

http://www.packetstormsecurity.org/groups/thc/slkm-1.0.html
(My apologies if such source materials are frowned upon)

Would it not be feasible to write a module, that controls chdir() and 
getdents64() to reject paths in "/export" except for the customers 
homedirectory (not sure how you'd get that though).
-- 
This message posted from opensolaris.org
_______________________________________________
sysadmin-discuss mailing list
sysadmin-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/sysadmin-discuss

Reply via email to