Bugtraq mailing list archives
chroot'ed environment?
From: marc () tky icdc fr (Marc Samama)
Date: Tue, 18 Apr 1995 21:12:16 +0900
Could someone give me a hint on what security it buys to do a chroot before servicing a request from a network daemon? I guess it depends on what the attacker is able to find in the chrooted environment, if he can import programs, ... Also, if it is not too off-topic, what would be the best way to allow syslogs after a chroot, if the syslog daemon uses unix datagram sockets, that dont survive the chroot call? Thank you, Marc.
Current thread:
- chroot'ed environment? Marc Samama (Apr 18)
- <Possible follow-ups>
- Re: chroot'ed environment? smb () research att com (Apr 19)
- Re: chroot'ed environment? der Mouse (Apr 19)
- Re: chroot'ed environment? Valdis.Kletnieks () vt edu (Apr 20)
- Re: chroot'ed environment? oea!owner-bugtraq () oea xs4all nl (Apr 19)
- Re: chroot'ed environment? don () paranoia com (Apr 20)