Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 16 Dec 1998 16:07:35 +0000
From:      Tony Finch <dot@dotat.at>
To:        current@FreeBSD.ORG
Subject:   Re: modification to exec in the kernel?
Message-ID:  <E0zqJU7-0000RJ-00@fanf.noc.demon.net>
In-Reply-To: <199812151821.KAA56685@apollo.backplane.com>
References:  <19981215120357.B11837@clear.co.nz> <199812142331.RAA17203@home.dragondata.com> <19981215124818.A22526@clear.co.nz> <199812150644.IAA67338@greenpeace.grondar.za> <199812150917.BAA52694@apollo.backplane.com> <19981216053701.B27078@clear.co.nz>

next in thread | previous in thread | raw e-mail | index | archive | help
Matthew Dillon <dillon@apollo.backplane.com> wrote:
>
>    I don't see the point.  Let me put it this way:  If you give
>    the user a non-chrooted environment but do not give the user access
>    to any suid/sgid programs, how is this different from giving the user
>    a chroot'd environment without access to any suid/sgid programs?  The
>    only difference that I can think of is access to /tmp.  I don't see how
>    the chroot'd environment is any safer then the non-chroot'd environment.

You can throw away a lot of stuff from the chrooted environment and
still leave the system useful to the admins. AFAICT breaking root in
an environment like this is much more like trying to do so over the
network because the machine's services are only accessible in that
sort of way.

This does assume the integrity of the kernel, though.

Tony.
-- 
   dxoigmn**f.a.n.finch
     fanf@demon.net
                                    dot@dotat.at

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E0zqJU7-0000RJ-00>