Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 22 Feb 2001 19:28:05 -0800
From:      Kris Kennaway <kris@obsecurity.org>
To:        Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Bind problems
Message-ID:  <20010222192805.A12575@mollari.cthul.hu>
In-Reply-To: <200102222330.f1MNU7e64567@cwsys.cwsent.com>; from Cy.Schubert@uumail.gov.bc.ca on Thu, Feb 22, 2001 at 03:29:48PM -0800
References:  <20010222134703.A7745@mollari.cthul.hu> <200102222330.f1MNU7e64567@cwsys.cwsent.com>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Thu, Feb 22, 2001 at 03:29:48PM -0800, Cy Schubert - ITSD Open Systems Group wrote:

> > Even running in a chroot or jail only goes so far, because they can
> > still run arbitrary code on the system as that user and use it to
> > e.g. launch DDoS attacks, run an rc5des client, you name it :)
> 
> I think you can mitigate or even eliminate that possibility.  First, 
> make all files directories in the chrooted environment writable by root 
> only, except for named's log directory and the directory it places its 
> named.pid file.  Next, union or nullfs mount with the noexec option the 
> directories where all of the named logs and pid file are written.
> 
> The worst that could happen is that the intruder could fill your disk.

No, they still get the ability to run arbitrary code because they
compromise a running process and take over its execution context.  The
attacker just needs to upload the code into the processes memory
space, instead of loading it from disk.

Kris

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE6ldjFWry0BWjoQKURAujDAJ43smf0BqNL1olXX/Jf9uHhTYnAZgCgkryz
XIXEeCShBsMqJONrt4SID94=
=uQJo
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010222192805.A12575>