How to block a website PERMANENTLY ?
Firefox 3.6.8
OpenSuse 11.2 I have the root password of my computer. I want to block a website on my computer such that even root cannot unblock it ! I *desperately* need help !!! |
Quote:
|
Hi,
Root is all powerful on a unix/linux box, you can make it a bit harder for root to change files, but you cannot stop it. Hope this helps. |
konsolebox,
Many thanks for replying ! Quote:
Quote:
|
Best do it on a piece of tertiary hardware...
Hi Anisha,
I've gone through this a few times... Problem is that any time someone has root on a system they can, if they know what they're doing, reinstate the service you've tried to kill. I'm not sure of the exact intent behind the block, but I'll say this: If you want to ensure that a site/service is not accessible and it's got to traverse the network, the best way to accomplish this is through configuration of some third-party device... Like the router. Some may say that a simple mod to the routing table will kill it, others might suggest adding it manually to the resolution stack for your distro... Problem is that they're both on the system you're trying to block the site from and, sadly, that means that if you can do it as root, root can undo it. You have the following options: - If this is going to be a regular practice, implement a robust proxy server and block the sites you want blocked on that. - If this is a one-off thing, just log into your router and (if it allows such a thing, which I believe most do now) block the remote address or set up a name resolution to resolve back to 127.0.0.1 or something of the sort... Sorry I can't help more, but as I said, if root can do it, root can undo it in Linux. |
Block it outside of the machine them, in the way of it to internet: maybe in your router?
|
... or use something like http://www.opendns.org/ (it's very simple to avoid, by changing the DNS entries - but a normal user normally don't know how to do this :P)
|
Quote:
Creating a virtual system is a same concept only that the system is also hosted in the system where the root account in question is placed. There are two ways to do this but only one is really applicable. Either you place the virtual system inside the same system where you have root (with this it appears that root still have access) or you place the two system (the virtual and the system that contains root) as two virtual systems placed in a third main system. The third main (which will turn out to be the first now) will be hosting the virtualization software like VirtualBox or VMWare that will create and emulate your virtual systems. This is quite heavy though. For more info about virtualization, here are the links: http://en.wikipedia.org/wiki/Virtualization http://en.wikipedia.org/wiki/Virtual_machine http://en.wikipedia.org/wiki/VirtualBox http://en.wikipedia.org/wiki/VMware P.S. I'm getting a feeling that there's already a feature in the kernel where you can easily solve your approach. Something like a special layer for summoning special processes or userspace applications that are not preemptible by root and will handle the filter. Maybe also a special rule like the iptables that's only configurable on compile time. |
Hi,
@konsolebox: If I understand correctly you are still on the same physical machine, the only thing one does is create one or more (maybe encrypted) VM's. The root user can still change/edit/remove parts (if it is encrypted, root cannot access it but can remove it). Looks like extra layers that will not protect you from root when it comes down to it. @anishakaul: You mention the following: I have the root password of my computer. If this is your computer, aren't you making it too hard for yourself to exclude root? If others do have access to your box, make sure that they do not have root access whatsoever (use sudo if they need some/limited access to specific files/commands). |
Well, I have to admit now.
This computer is in my office. I am *HIGHLY ADDICTED* to a particular site. I have requested the (windows based) system admins to block that site on my computer. They said that the site blocking software license has expired so they cannot block any site anywhere now.:banghead: |
Quote:
Quote:
|
Quote:
Indeed I was thinking before about redirecting your dns queries to somewhere else but I haven't thought the obvious... It appears that you can still change it back to normal dns settings anytime you like. Guess I was wrong. Btw if it's only a site block software that's required, maybe somewhere there's a free software that you can use? Did you try to search the web already. The concept about filtering your connection is still possible I think. |
Hi,
Quote:
Code:
+------------------------+ root_a, however, can access the physical machine A and both VM's B0 and B1. @anishakaul: Expired license..... LOL. Seriously: This is probably the safest way to block a site (use a machine you do not have [enough] access on). I also find it kinda strange that the license is not renewed by your company, puts them in a precarious situation if they get audited. BTW: You aren't talking about blocking LQ, are you ;) |
Quote:
Quote:
Quote:
|
Quote:
|
All times are GMT -5. The time now is 09:45 AM. |