Date: Fri, 1 Nov 1996 20:04:43 -0500 (EST) From: Dev Chanchani <dev@trifecta.com> To: Marc Slemko <marcs@znep.com> Cc: freebsd-security@FreeBSD.org Subject: Re: chroot() security Message-ID: <Pine.BSF.3.91.961101200316.8137A-100000@www.trifecta.com> In-Reply-To: <Pine.BSF.3.95.961101161812.22655A-100000@alive.ampr.ab.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 1 Nov 1996, Marc Slemko wrote: > Never loose sight of the fact that if someone gets root in the chrooted > environment, they have root on the whole machine. The chrooted > environment does not lessen the implications of getting root, it only > makes it harder to do so. Marc, Thanks for the reply. Basically, how can someone get out of a chroot()'ed environment is they get root? Can they access the filesystem outsite their chroot()'ed directory? I know they can place their own binaries and begin to sniff, etc, but can they easily get out of their environment? Also, can a user access the inode table or does the kernel only access the inode table? Thanks..
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.961101200316.8137A-100000>