From: deneme.true <den...@gm...> - 2013-01-03 00:07:54
|
Hello, At past, I've seen Henry's comments in coLinux wiki regarding preventing to break coLinux kernel. I thought, similar way, but couldn't successful yet to protect host environment. My thought details are below with using two instance of coLinux image, If this prevention is true, I can write these details to coLinux wiki, but I would like to hear your thoughts to protect host environment from bad guys. I am running two instance of coLinux environment, DMZ area will get the attacks, other instance has connection to host and will be used for regular tasks(ftp,http etc) But I couldn't success with this configuration but Isn't it correct theoretically? -------------- | Internet | -------------- | --------------- | router | --------------- / \ / \ coLinux 1(eth0) coLinux 2 (eth0) 192.168.1.2 192.168.1.3 Connection to Host with eth1 DMZ Area (Closed to anywhere) / / / ---------- | Host | ---------- |