Bugtraq mailing list archives

chroot'ed environment?


From: marc () tky icdc fr (Marc Samama)
Date: Tue, 18 Apr 1995 21:12:16 +0900


Could someone give me a hint on what security it buys to do a chroot before
servicing a request from a network daemon? I guess it depends on what the
attacker is able to find in the chrooted environment, if he can import 
programs, ...

Also, if it is not too off-topic, what would be the best way to allow syslogs
after a chroot, if the syslog daemon uses unix datagram sockets, that dont
survive the chroot call?

Thank you,

Marc.



Current thread: