From: SourceForge.net <no...@so...> - 2005-06-23 17:39:12
|
Feature Requests item #1078722, was opened at 2004-12-03 19:18 Message generated for change (Settings changed) made by gboutwel You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=622066&aid=1078722&group_id=98788 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: None Group: None >Status: Closed Priority: 5 Submitted By: Nobody/Anonymous (nobody) Assigned to: Nobody/Anonymous (nobody) Summary: Allow running coLinux without Administrative rights Initial Comment: coLinux is a wonderful tool to isolate processes under windows. Currently it requires administrative rights in order to use the networking interface. If TAP would have had a way to configure ACL that allows specifying users that allow to connect, A few coLinux machine can run on the same Windows machine without the ability to interrupt each other. Except of the TAP device I could not find any other issue that prevent coLinux running under unprivileged account. ---------------------------------------------------------------------- Comment By: George P Boutwell (gboutwel) Date: 2005-02-25 14:48 Message: Logged In: YES user_id=30412 I've just checked there is an FAQ item on the openvpn.org web-stie about not being able to run as non-admin. So this is a limitation of TAP, if you use something other than TAP you should be able to run as a non-priveledged user. ---------------------------------------------------------------------- Comment By: George P Boutwell (gboutwel) Date: 2005-02-24 16:33 Message: Logged In: YES user_id=30412 Otherwise you could use WinPCAP or slirp networking methods. ---------------------------------------------------------------------- Comment By: George P Boutwell (gboutwel) Date: 2005-02-24 16:32 Message: Logged In: YES user_id=30412 Correct, If installed as an Administrator (so that the kernel mode driver can be installed), the only thing that doesn't work in user-mode is TAP. Tap is really a seperate project, perhaps the TAP developers could help get it working in user-mode. ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=622066&aid=1078722&group_id=98788 |
From: SourceForge.net <no...@so...> - 2005-06-23 18:01:01
|
Feature Requests item #1078722, was opened at 2004-12-04 01:18 Message generated for change (Comment added) made by plugwash You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=622066&aid=1078722&group_id=98788 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: None Group: None Status: Closed Priority: 5 Submitted By: Nobody/Anonymous (nobody) Assigned to: Nobody/Anonymous (nobody) Summary: Allow running coLinux without Administrative rights Initial Comment: coLinux is a wonderful tool to isolate processes under windows. Currently it requires administrative rights in order to use the networking interface. If TAP would have had a way to configure ACL that allows specifying users that allow to connect, A few coLinux machine can run on the same Windows machine without the ability to interrupt each other. Except of the TAP device I could not find any other issue that prevent coLinux running under unprivileged account. ---------------------------------------------------------------------- Comment By: peter green (plugwash) Date: 2005-06-23 18:01 Message: Logged In: YES user_id=418950 you do realise that by allowing normal users to run colinux instances you have totally destoryed the systems security don't you?! ---------------------------------------------------------------------- Comment By: George P Boutwell (gboutwel) Date: 2005-02-25 20:48 Message: Logged In: YES user_id=30412 I've just checked there is an FAQ item on the openvpn.org web-stie about not being able to run as non-admin. So this is a limitation of TAP, if you use something other than TAP you should be able to run as a non-priveledged user. ---------------------------------------------------------------------- Comment By: George P Boutwell (gboutwel) Date: 2005-02-24 22:33 Message: Logged In: YES user_id=30412 Otherwise you could use WinPCAP or slirp networking methods. ---------------------------------------------------------------------- Comment By: George P Boutwell (gboutwel) Date: 2005-02-24 22:32 Message: Logged In: YES user_id=30412 Correct, If installed as an Administrator (so that the kernel mode driver can be installed), the only thing that doesn't work in user-mode is TAP. Tap is really a seperate project, perhaps the TAP developers could help get it working in user-mode. ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=622066&aid=1078722&group_id=98788 |