Date: Fri, 18 Dec 1998 21:00:56 +0100 From: Poul-Henning Kamp <phk@critter.freebsd.dk> To: "Marco Molteni" <molter@tin.it> Cc: "Jordan K. Hubbard" <jkh@zippy.cdrom.com>, freebsd-security@FreeBSD.ORG Subject: Re: A better explanation (was: buffer overflows and chroot) Message-ID: <11082.914011256@critter.freebsd.dk> In-Reply-To: Your message of "Fri, 18 Dec 1998 19:57:07 %2B0100." <Pine.BSF.3.96.981218193124.339A-100000@nympha>
next in thread | previous in thread | raw e-mail | index | archive | help
Marco and others. I have a set of patches which makes a chroot jail escape proof. These were developed under contract and will end up in FreeBSD sometime over the next year. My client wants to get a head start, and that is only fair. The basic concept is that root is only root in a jail if the filesystem protects the rest of the system, otherwise he isn't. For instance he can change the owner or modes on a file, but he cannot change IP# on an interface. He can bind to a priviledged TCP port, but only on the IP# which belongs to the jail. And so forth. Works pretty well. -- Poul-Henning Kamp FreeBSD coreteam member phk@FreeBSD.ORG "Real hackers run -current on their laptop." "ttyv0" -- What UNIX calls a $20K state-of-the-art, 3D, hi-res color terminal To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?11082.914011256>
