[1534] in bugtraq

home help back first fref pref prev next nref lref last post

chroot'ed environment?

daemon@ATHENA.MIT.EDU (Marc Samama)
Wed Apr 19 01:41:51 1995

Date: Tue, 18 Apr 1995 21:12:16 +0900
From: Marc Samama <marc@tky.icdc.fr>
To: bugtraq@fc.net


Could someone give me a hint on what security it buys to do a chroot before
servicing a request from a network daemon? I guess it depends on what the
attacker is able to find in the chrooted environment, if he can import 
programs, ...

Also, if it is not too off-topic, what would be the best way to allow syslogs
after a chroot, if the syslog daemon uses unix datagram sockets, that dont
survive the chroot call?

Thank you,

Marc.

home help back first fref pref prev next nref lref last post