On Tue, May 23, 2006 7:19 pm, Zak B. Elep wrote:
> Hi Norbert!

hello! :-)

> Yeah, it is perhaps quite possible for a uid-0 process to get out of
> the chroot, which is why a chroot must be properly configured in the
> first place, having just the bare metal to run the allowed apps per
> the site's policy.  Again, a good /etc/sudoers can help.  I also hear
> on the grapevine that there's a fakeroot-aware sudo in the works
> too...

imho its not 'quite' possible. its _very_ possible. chroot() has no
security feature to offer if the processes running inside it is uid 0.
that's why its very recommended for a process to seteuid() once it
sucessfully invokes chroot() syscall.

> As for the nowhere-land bits, I have to agree with you, my bad :/  I'm
> used to building chroots within chroots within chroots (or, more
> precisely, pbuilder in dchroot in dchroot)... don't ask me why ;P

we finally agree on this matter :-). however, chroot w/in chroot w/in
chroot (and so on...) can be easily escaped just like in the case of a
single chroot() call. chroot() syscall can be only invoked by uid 0.
chroot w/in chroot means its still uid 0. but since you do it for
packaging purposes and not for chrooting a service (let's say apache or
bind), then we have nothing to argue about ;-)

cheers!

_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
plug@lists.linux.org.ph (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph

Reply via email to