On Sat, Nov 22, 2008 at 04:17, Jan-Frode Myklebust <[EMAIL PROTECTED]> wrote:
> Did you see the comment from Rainer about the secpath-replace property?
> I think that proves my basis is not flawed. The chroot here protects
> against code flaws, or configuration flaws that could otherwise give
> attacker the possibility of overwriting system files.

I most certainly did, but all the secpath-replace property protects
against is an administrator foolishly trusting unvalidated data from a
remote host to generate file paths.  Chroot does not protect against
code flaws, full stop.  That is the continuing flaw in your argument.
Chroot only prevents code flaws from affecting anything _outside_ of
the chroot environment.

> Also you pointing at "most exploits bring their own executable .. operate
> purely in-memory" argument is flawed when I'm arguing for chroot being
> *more* secure. Not 100% secure against all flaws, but *more* secure than
> a non-chrooted process.

You mistake what I am arguing - there is no question that chroot()
helps protect the host system's files.  What it does _not_ protect
against is abuse of anything within the chroot().  Your statement was:

> so I would argue that my sensitive syslogged data is more secure in a
> chroot environment

If your log data is being stored inside that chroot, you are utterly
wrong.  Please actually understand what chroot() does before you
continue making wild, unfounded statements.
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com

Reply via email to