[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-users] Using Xen as a jail for malicious code


  • To: xen-users@xxxxxxxxxxxxxxxxxxx
  • From: Rob Renaud <rrenaud@xxxxxxxxx>
  • Date: Sat, 22 Oct 2005 21:04:03 -0400
  • Delivery-date: Sun, 23 Oct 2005 01:01:26 +0000
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=LITIM0JUXc9mufRxa8uJ4iUD8JY29xDo2hibaM9g61WL/yYT5PVPs6476rMcc0hgI+gSVI3UUwcCe61RhwjqdsB+BZR3qUBiCw+RVzCRYLdb9WXQaPD0/uEZQrANunnkZkPW06E2ZIvavYv6flG1cN47vI5shaYmTK8bh0mUfww=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>

I am beginning to write some open source programming contest software
(http://threec.berlios.de).  I am wondering if Xen would be a suitable
jail for arbitrary and anonymous code submitted for the judging
software.  I'd like to ensure that code can run for only a limited
time, use a limited amount of memory, and not have access to resources
including the network and most of the judger's filesystem.

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.