Date: Wed, 16 Dec 1998 15:55:55 +0000 From: Tony Finch <dot@dotat.at> To: current@FreeBSD.ORG Subject: Re: modification to exec in the kernel? Message-ID: <E0zqJIp-0000QT-00@fanf.noc.demon.net> In-Reply-To: <199812151650.SAA68842@greenpeace.grondar.za> References: <19981215120357.B11837@clear.co.nz> <199812142331.RAA17203@home.dragondata.com> <19981215124818.A22526@clear.co.nz> <199812150644.IAA67338@greenpeace.grondar.za> <199812150917.BAA52694@apollo.backplane.com> <19981216053701.B27078@clear.co.nz> <19981216053701.B27078@clear.co.nz>
next in thread | previous in thread | raw e-mail | index | archive | help
Mark Murray <mark@grondar.za> wrote:
>Joe Abley wrote:
>> So how is this more dangerous than a non-chrooted environment? Surely it
>> is _as_ safe - but with the added control that the user sees an appropriate
>> subset of the entire filesystem that is controlled, regardless of what the
>> system as a whole needs to have installed in order to function?
>
>You give the user Perl5, you may as well give them a C compiler.
>They'll have full access to sockets etc. Who knows what nasty
>attacks they can launch against you from inside your own network.
I think some sort of firewalling is the answer here.
>Given that the chroot'ed environment is "sanitised", it becomes
>easy to control (within its limits) and understand. I am not
>proposing security-by-obsurity here, just that you either make it
>"UNIX" and go with that warts-and-all (security patrols necessary),
>or make it tighter than a mouse's arse (and non-useful to
>scriptwriters).
Depends on the script -- if the only executable you allow the users
access to is perl it's still a useful environment.
Tony.
--
f.a.n.finch.523654357374743743747333764375697569700
fanf@demon.net
dot@dotat.at
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E0zqJIp-0000QT-00>
