Re: putting Apache into chroot()-prison

2000-12-31 Thread brian moore
On Sun, Dec 31, 2000 at 12:01:48AM -0800, Nate Amsden wrote:
> Nathan E Norman wrote:
> 
> > Do you realise you quoted 40 lines of the original message and added 1
> > meaningful line?  What a waste of bandwidth.
> 
> hah. my 1meg dsl line runs average at 2.8% for the past week,
> i got plenty of bandwidth to spare :P

Oh, so you're now hosting the Debian mailing lists?

(hint: unless you are, you are not providing the -real- bandwidth needed
to carry this list.  Your comment is about as appropriate as responding
to a hungy person with "oh, but I have lots of food, it's okay for me to
throw it away")



Re: putting Apache into chroot()-prison

2000-12-31 Thread Nate Amsden
Nathan E Norman wrote:

> Do you realise you quoted 40 lines of the original message and added 1
> meaningful line?  What a waste of bandwidth.

hah. my 1meg dsl line runs average at 2.8% for the past week,
i got plenty of bandwidth to spare :P

http://portal.aphroland.org/mrtg/

nate

-- 
:::
ICQ: 75132336
http://www.aphroland.org/
http://www.linuxpowered.net/
[EMAIL PROTECTED]



Re: putting Apache into chroot()-prison

2000-12-29 Thread JoshNarins

From what I've been able to gather,
chroot can be secure,
   but only if the user can never get root.
FreeBSD's jail had a recent problem.
Mounting /proc inside the chroot is not a good idea.


In a message dated 12/27/00 7:01:21 PM Eastern Standard Time, [EMAIL PROTECTED] writes:


not to discourage youb ut its pretty well known chroot() is not
an ultimate solution for security, it has been in the past
rather easy to break out of it, from what i remember you
may be better off running freebsd and it's jail() (??) 
function which is a suped up chroot(). all im trying to say
is don't expect chroot() to improve seucrity much, a determined
cracker can defeat it(esp on linux) pretty easy. search BUGTRAQ
for the discussions on the latest BIND problems(probably
about 6 months ago..) interesting discussions.





Re: putting Apache into chroot()-prison

2000-12-29 Thread Wayne Topa

Subject: Re: putting Apache into chroot()-prison
Date: Thu, Dec 28, 2000 at 03:19:53PM -0600

In reply to:Nathan E Norman

Quoting Nathan E Norman([EMAIL PROTECTED]):
> 
> No, it's a company as demonstrated by the "Micromuse Inc.". `whois
> micromuse.com', and a look at http://www.micromuse.com.  Thanks for the
> well thought out attempt at a put-down.  I'll avoid condescending
> remarks based on your email address.

Very well done Nathan, I was about to reply to the original poster as
well but you did it much better!

I am getting really tired of the lack of manners when it comes to mail
on this list.  

Regards
Wayne
-- 
You had mail, but the super-user read it, and deleted it!
___



Re: putting Apache into chroot()-prison

2000-12-28 Thread Nathan E Norman
On Thu, Dec 28, 2000 at 04:02:03PM -0500, [EMAIL PROTECTED] wrote:
> 
> Hey Norman,

The name's Nathan ... I realize it's a difficult name to parse.
 
>As an unbiased observer I will comment on your
> comment concerning the quote/content ratio of the other
> poster. You have your preferences. Tons of flamewars are
> started when people selectively quote and people respond
> t o statementso the out of context. Nine lines is an 
> excessive .sig, I grant. I've never used a .sig though, so
> I can say that.

My comments (and preferences) are based on long-standing Use-Net
tradition which is generally followed by caring mailing list
participants.  When in Rome, do as the Romans do and all that.
 
You should quote enough material so that successive posters can't
take a quote out of context.  You don't need to quote everything,
especially sigs and blank lines.

>If you want to pass a law, write your representative,
> or become a representative. 

I don't believe I said anything about passing a law.  What are you,
some kind of troll?

>   Hey, is micro muse a statement about small thoughts?

No, it's a company as demonstrated by the "Micromuse Inc.". `whois
micromuse.com', and a look at http://www.micromuse.com.  Thanks for the
well thought out attempt at a put-down.  I'll avoid condescending
remarks based on your email address.

-- 
Nathan Norman - Staff Engineer | A good plan today is better
Micromuse Inc. | than a perfect plan tomorrow.
mailto:[EMAIL PROTECTED]   |   -- Patton


pgpIjWaybUjdZ.pgp
Description: PGP signature


Re: putting Apache into chroot()-prison

2000-12-28 Thread Nathan E Norman
On Thu, Dec 28, 2000 at 01:35:50PM +0400, Rino Mardo wrote:
> On Wed, Dec 27, 2000 at 03:57:27PM -0800 or thereabouts, Nate Amsden wrote:

[ 21 lines deleted ]

> > not to discourage youb ut its pretty well known chroot() is not
> > an ultimate solution for security, it has been in the past
> > rather easy to break out of it, from what i remember you
> > may be better off running freebsd and it's jail() (??) 
> > function which is a suped up chroot(). all im trying to say
> 
> what about OpenBSD (OAMP)?
 
What about it?  If OpenBSD has jail() I expect the same reasoning
applies.
 
[ 19 lines deleted + 9 for sig ]

Do you realise you quoted 40 lines of the original message and added 1
meaningful line?  What a waste of bandwidth.

-- 
Nathan Norman - Staff Engineer | A good plan today is better
Micromuse Inc. | than a perfect plan tomorrow.
mailto:[EMAIL PROTECTED]   |   -- Patton


pgpzzwWoVUwh9.pgp
Description: PGP signature


Re: putting Apache into chroot()-prison

2000-12-28 Thread Rino Mardo
On Wed, Dec 27, 2000 at 03:57:27PM -0800 or thereabouts, Nate Amsden wrote:
> "R. M. Lampert" wrote:
> > 
> > Hi, folks!
> > 
> > Due to some very unpleasant experience in the company
> > I'm working at (rootshell attack due to a buffer overflow
> > intrusion in httpd...)  there's a great need with us
> > to inform thoroughly about changing to a safer environment,
> > that is LAMP  or even better NAMP (NetBSD, Apache ... there
> > are some very unpalatable truths in the world, indeed!).
> > 
> > Of topmost interest is building Apache and everything
> > that is associated with it (particularly MySQL, PHP, Perl)
> > within a chroot() environment to lock intruders within
> > this special ,,root directory``.
> > 
> > Do you know any pointer to chroot()-information that includes
> > some kind of HOWTO rather than a list of advantages of this
> > approach?
> 
> 
> not to discourage youb ut its pretty well known chroot() is not
> an ultimate solution for security, it has been in the past
> rather easy to break out of it, from what i remember you
> may be better off running freebsd and it's jail() (??) 
> function which is a suped up chroot(). all im trying to say

what about OpenBSD (OAMP)?


> is don't expect chroot() to improve seucrity much, a determined
> cracker can defeat it(esp on linux) pretty easy. search BUGTRAQ
> for the discussions on the latest BIND problems(probably
> about 6 months ago..) interesting discussions.
> 
> nate
> 
> -- 
> :::
> ICQ: 75132336
> http://www.aphroland.org/
> http://www.linuxpowered.net/
> [EMAIL PROTECTED]
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 

-- 



Key fingerprint = 9DE1 5825 77B4 FF45 7485  D3EB DCCF DE48 09B6 4426


"Who's watching the watchmen?"


pgpQ8QSnFN80Y.pgp
Description: PGP signature


Re: putting Apache into chroot()-prison

2000-12-27 Thread Nate Amsden
"R. M. Lampert" wrote:
> 
> Hi, folks!
> 
> Due to some very unpleasant experience in the company
> I'm working at (rootshell attack due to a buffer overflow
> intrusion in httpd...)  there's a great need with us
> to inform thoroughly about changing to a safer environment,
> that is LAMP  or even better NAMP (NetBSD, Apache ... there
> are some very unpalatable truths in the world, indeed!).
> 
> Of topmost interest is building Apache and everything
> that is associated with it (particularly MySQL, PHP, Perl)
> within a chroot() environment to lock intruders within
> this special ,,root directory``.
> 
> Do you know any pointer to chroot()-information that includes
> some kind of HOWTO rather than a list of advantages of this
> approach?


not to discourage youb ut its pretty well known chroot() is not
an ultimate solution for security, it has been in the past
rather easy to break out of it, from what i remember you
may be better off running freebsd and it's jail() (??) 
function which is a suped up chroot(). all im trying to say
is don't expect chroot() to improve seucrity much, a determined
cracker can defeat it(esp on linux) pretty easy. search BUGTRAQ
for the discussions on the latest BIND problems(probably
about 6 months ago..) interesting discussions.

nate

-- 
:::
ICQ: 75132336
http://www.aphroland.org/
http://www.linuxpowered.net/
[EMAIL PROTECTED]



Re: putting Apache into chroot()-prison

2000-12-27 Thread JoshNarins
Here are a couple links which should help you get on your way.

(Thanks to Stas Bekman, just another mod_perl hacker)

http://www.securityfocus.com/focus/sun/articles/apache-inst.html

http://forum.swarthmore.edu/epigone/modperl/stimlorthen



putting Apache into chroot()-prison

2000-12-27 Thread R. M. Lampert
Hi, folks!

Due to some very unpleasant experience in the company
I'm working at (rootshell attack due to a buffer overflow
intrusion in httpd...)  there's a great need with us
to inform thoroughly about changing to a safer environment, 
that is LAMP  or even better NAMP (NetBSD, Apache ... there
are some very unpalatable truths in the world, indeed!).

Of topmost interest is building Apache and everything
that is associated with it (particularly MySQL, PHP, Perl) 
within a chroot() environment to lock intruders within 
this special ,,root directory``.  

Do you know any pointer to chroot()-information that includes
some kind of HOWTO rather than a list of advantages of this
approach?

Thanx in advance,


-- 

Matthias Lampert   
   .^. 
Graal-Müritzer-Str. 1b ||  /V\   
22885 Barsbüttel   ||/(   )\
Tel: (040) 670 89 445  || ^^-^^