Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 24 Dec 1998 09:45:56 +1030 (CDT)
From:      Mark Newton <newton@camtech.com.au>
To:        eivind@yes.no (Eivind Eklund)
Cc:        casper@acc.am, freebsd-security@FreeBSD.ORG
Subject:   Re: About chroot
Message-ID:  <199812232315.JAA13917@frenzy.ct>
In-Reply-To: <19981223142742.Q24362@follo.net> from Eivind Eklund at "Dec 23, 98 02:27:42 pm"

next in thread | previous in thread | raw e-mail | index | archive | help
Eivind Eklund wrote:

 > On Wed, Dec 23, 1998 at 02:10:18PM +0400, Casper wrote:
 > > OK, thanx ... i'll look for this patch
 > 
 > (Safer chroot) That patch is not publically available yet.

k, until it is...


I have a patch which completely disables chroot() for processes which
have already been chroot()'ed (by making chroot() fail with EPERM
if the process' root directory is not the same as init's root directory
whether it's being called by the superuser or not). 

I've posted it here before anything up to a year ago and don't recall
{any/much} complaining about it.

It breaks traditional semantics so it should be optional (if you are 
running the kind of site that finds such a patch necessary you probably
think that securing chroot() is more important than preserving traditional
semantics anyway).

If there's support for this (especially from the security guys) I can
wrap it in a sysctl knob and commit it (with notes in the chroot(2)
manpage describing the knob of course).

    - mark


---
Mark Newton                               Email: newton@camtech.com.au
Systems Engineer and Senior Trainer       Phone: +61-8-8303-3300
Camtech (SA), a member of the             Fax:   +61-8-8303-4403
CAMTECH group of companies                WWW:   http://www.camtech.com.au

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199812232315.JAA13917>