home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.unix.programmer:4320 comp.security.misc:1017 comp.unix.admin:4554
- Newsgroups: comp.unix.programmer,comp.security.misc,comp.unix.admin
- Path: sparky!uunet!pipex!slxsys!dircon!uaa1006
- From: uaa1006@dircon.co.uk (Peter Miles)
- Subject: How secure is chroot?
- Date: Sat, 15 Aug 1992 09:38:48 GMT
- Message-ID: <1992Aug15.093848.9784@dircon.co.uk>
- Lines: 26
-
-
- I'm developing a system which uses the chroot(S) call to limit
- the area a user can access on a UNIX system.
-
- I have a program which is SUID root, which runs chroot and then
- sets the UID of the process to that of the user, and spawns
- /bin/sh (which is present under the chroot path).
-
- My question is....how secure is this? Are there any areas I
- should look out for to ensure that no one can access other parts
- of the system?
-
- General comments and observations about the chroot facility
- would also be of interest.
-
- I should add that under the chroot area, I've created a /dev
- directory, containing entries for /dev/null, /dev/tty, /dev/socksys
- (for outgoing ftp/telnet).
-
- Please email any replies, and I'll post a summary to the net.
-
- Thanks for any help!
- -- Pete
- --
- Pete Miles uaa1006@dircon.co.uk
- ...uknet!dircon!uaa1006
-