JW wrote:
1. They cannot access the host filesystem system Possible. You could assign each user it's own role/domain and restrict access.
2. They cannot acess any files anywhere except in their $HOME Hm, what's with password files?
3. I want to be able to allow/disallow the ports they have access to.
Possible with LIDS and SELinux. I think RSBAC can control that too.
4. I'd like to be able to prevent them from using any IP address but the ones allocated to them. I think it's possible. Download the SELinux package, unpack it and take a look at the /selinux/policy/net_contexts file. There you see ports and ips listed and assigned to roles, domains, ...
5. Processes should not be able to "see" or interact with the host's/other users processes and filesystems. Possible through role based access. RSBAC and SELinux may handle that.
It was suggested to me that SE Linux would allow fine grained controll over things like this, but I'm a little confused after reading some other things. It's not easy to install and maintain :)
Can anyone offer any other suggestions/advise as to how I should go about this? Take a look at SELinux and let's share our results.
Would you recommend any other form of system-wide acess control besides SE Linux? I've looked at LIDS and RSBAC so far. Other projects are Medusa DS9, DTE and User Mode Linux. With User Mode Linux you can have your own virtual Linux sessions.
Mark