Re: [PATCH] sys_chroot() hook for additional chroot() jails enforcing

2005-02-08 Thread Lorenzo Hernández García-Hierro
El lun, 07-02-2005 a las 14:34 -0800, Chris Wright escribió: > * Lorenzo Hernández García-Hierro ([EMAIL PROTECTED]) wrote: > > Attached you can find a patch which adds a new hook for the sys_chroot() > > syscall, and makes us able to add additional enforcing and security > > checks by using the Li

Re: [PATCH] sys_chroot() hook for additional chroot() jails enforcing

2005-02-07 Thread Lorenzo Hernández García-Hierro
El lun, 07-02-2005 a las 16:50 -0600, Serge E. Hallyn escribió: > Hi, > > If I understood you correct earlier, the only policy you needed to > enforce was to prevent double-chrooting. If that is the case, why is it > not sufficient to keep a "process-has-used-chroot" flag in > current->security w

Re: [PATCH] sys_chroot() hook for additional chroot() jails enforcing

2005-02-07 Thread Serge E. Hallyn
Hi, If I understood you correct earlier, the only policy you needed to enforce was to prevent double-chrooting. If that is the case, why is it not sufficient to keep a "process-has-used-chroot" flag in current->security which is set on the first call to capable(CAP_SYS_CHROOT) and inherited by fo

Re: [PATCH] sys_chroot() hook for additional chroot() jails enforcing

2005-02-07 Thread Chris Wright
* Lorenzo Hernández García-Hierro ([EMAIL PROTECTED]) wrote: > Attached you can find a patch which adds a new hook for the sys_chroot() > syscall, and makes us able to add additional enforcing and security > checks by using the Linux Security Modules framework (ie. chdir > enforcing, etc). If you

[PATCH] sys_chroot() hook for additional chroot() jails enforcing

2005-02-07 Thread Lorenzo Hernández García-Hierro
Hi, Attached you can find a patch which adds a new hook for the sys_chroot() syscall, and makes us able to add additional enforcing and security checks by using the Linux Security Modules framework (ie. chdir enforcing, etc). Current user of the hook is the forthcoming 0.2 revision of vSecurity.