Thanks Anomie! I guess I didn't explain very clearly, but students do have access to a virtualized environment (I called it a VM above), and it works well. But for repeated/long use it is slow so we're taking a stab at a live install. I am gathering you are correct about the context I'm in, though... it looks like it will be very difficult to restrict write access to this partition.
At this point, I predict we'll be settling for having the live install be very restricted, with access to only a few commands (maybe just apt-get, who knows).
The last idea I'm trying at this moment is having the partition mounted on boot as read-only, and restricting sudo access to un-mounting anything. Seems already like a fail, though, because even if the user cannot execute "/bin/umount", they can "cp /bin/umount ~" and execute it from their home directory...
If anyone following in my footsteps wants to see how (simple & weak) command restriction is performed, here are the corresponding lines in "/etc/sudoers" (edited with the command "sudo visudo"):
Code:
#alias for command(s) we want to restrict
Cmnd_Alias MOUNT = /bin/mount
#limit users in group 'test' from mounting
%test ALL=(ALL) ALL, !MOUNT
Bookmarks