Just a thought recommended to me by RedHat last year.

Run SELinux :

       SELinux can enforce the access rights of every user,
       application, process, and file
       within a Red Hat system to a degree previously unavailable in
       enterprise operating
       systems. It ensures that any application behaves as intended
       with very low
       performance overhead. (For more Information, see Red Hat
       Enterprise Linux Security
       Series: SELinux)

       Link: http://www.redhat.com/f/pdf/RHEL_Security_WP_web.pdf

Cdlt, Dave
--------
YBA wrote:
Hello,

I was running apache for a number of years using fully blown chroot environment, mostly on RHEL (using "chroot" binary as a base). Recently, I have faced a requirement to wrap it up into rpm, which is not an easy task, considering all up to date libs, dependencies, etc.

As chrootdir directive seems to appeared only in 2.2.9 (?), part of mod_unixd, my question is how one could compare it to fully blown chroot environment, looking at it from security point of view. Would that be the same or are there any drawbacks on "chrootdir" side?

Also, I used to see information about mod_chroot, module, but this seem to disappeared at some point. I believe this module is not maintained any more for this purpose (at least google does not seem to know about it any more)?

All comments on this would be most appreciated.

Cheers.

S.

Reply via email to