Matthew Pounsett <m...@conundrum.com> wrote:
>
> Privsep doesn't actually fix the same problem chroot does.   As I
> understand it, privsep reduces the attack surface for remote execution
> exploits by shuffling off privileged operations to a separate process, but
> if that process isn't chrooted and it has a remote code execution flaw then
> your entire system is opened up to attack.

Actually it is normal for privsep processes to chroot themselves, usually
to /var/empty - e.g.

https://github.com/openssh/openssh-portable/blob/master/sshd.c#l642
https://github.com/openntpd-portable/openntpd-openbsd/blob/master/src/usr.sbin/ntpd/ntp.c#l130

Tony.
-- 
f.anthony.n.finch  <d...@dotat.at>  http://dotat.at/  -  I xn--zr8h punycode
Biscay: North 4 or 5. Slight or moderate. Showers. Good.
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to