On 2008-11-21, RB <[EMAIL PROTECTED]> wrote:
> On Fri, Nov 21, 2008 at 07:31,  <[EMAIL PROTECTED]> wrote:
>> just pointing out that on this central server the data will be in the same
>> place as the daemon listening to the network, and accessable to that
>> daemon, so chrooting, dropping privilages, etc won't protect the data that
>> gets logged (it will allow you to protect other data that lives on the
>> server, just not log data)
>
> As is the same with all chrooted processes - the chroot model prevents
> untrusted processes from messing with each other's candy, not their
> own.  If anyone that runs a chroot thinks otherwise, they're sorely
> mistaken.

I think the chroot() limits the possibility of:

    - executing anything outside the chroot (f.ex. /bin/sh)
    - write a new file, and execute it (noexec on the chroot mountpoint)
    - overwrite something outside the chroot. I'm an itsy bit worried that 
      something like this:
    
        $template PerAppLogs,"/var/log/apps/%programname%.log"
        *.* -?PerAppLogs

      could be tricked to write to unexpected places if you mess with
      %programname%, or other similar variables that the sender has complete
      controle over.

so I would argue that my sensitive syslogged data is more secure in a
chroot environment where there are no other executables, than on a non-
chroot environment.



  -jf

-- 
To know recursion, you must first know recursion.

_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com

Reply via email to