Date: Thu, 28 Jul 2005 12:22:46 +0200 From: "mdff" <nospam@mgedv.net> To: <freebsd-isp@freebsd.org> Subject: RE: preventing a user to start a process Message-ID: <20050728102246.80B27186800@mgedv.at> In-Reply-To: <42E6A0B2.1030308@chef-ingenieur.de>
next in thread | previous in thread | raw e-mail | index | archive | help
> > Although jailing is a good thing, I don't think it will
> prevent unwanted
> > processes to be spawned, if php allows it. And having writable
> > directories mounted noexec doesn't help much either,
> because one can
> > just run:
> > /usr/bin/sh /path/to/writable/dir/script.sh
> >
mount-man-page:
<snip>
noexec Do not allow execution of any binaries on the mounted
file system. This option is useful for a server that has
file systems containing binaries for architectures other
than its own.
<snap>
tried this as root:
# h_dir=/test; h_sh=/tmp/foo-test.sh
# mkdir $h_dir
# mdmfs -M -S -o noexec,async -s 16m md1 $h_dir && mount|grep $h_dir
/dev/md1 on /test (ufs, asynchronous, local, noexec)
# cp -p /bin/date $h_dir
# echo "#!/bin/sh" >$h_sh
# echo "\$SHELL -c $h_dir/date" >>$h_sh
# $h_sh
/test/date: Permission denied.
so i believe this is not really dangerous (chrooted of course)
but theres another issue, what if someone stores a malicious php-script
that opens sockets? you don't really need to write C-deamons, if you can
use php...
there should be at least a firewall blocking outgoing packets from ports
where no daemons are normally running. and restrictions on php's options
and possibilities, too...
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050728102246.80B27186800>
