Quoting Eugen Leitl ([EMAIL PROTECTED]): > On Tue, Apr 25, 2006 at 08:25:37PM +1000, Tony Lewis wrote: > > > I think this would be a valuable addition to vservers. One of the risks > > of "renting" a virtual server (pick your flavour) is that you're not > > safe from the hosting sysadmin. If vservers could offer something like > > You are never safe from the hoster. Either you trust her, or you don't. > It's as simple as that. > > (Or, you bring in sealed tamper-proof hardware in, then you have > some degree of protection).
Agreed. Now if you *are* the host admin, you can provide the needed infrastructure so that you can farm out some of the lighter admin work to "mostly but not quite trusted" sub-admins, and keep them from poking the vservers. But you simply cannot protect from the host admin. After all, what makes him run your new kernel, unpatched? What stops him rebooting, or poking /dev/kmem, or loading kernel module "open-up-vservers-like-cracked-eggs.ko"? -serge _______________________________________________ Vserver mailing list [email protected] http://list.linux-vserver.org/mailman/listinfo/vserver
