Home page logo

bugtraq logo Bugtraq mailing list archives

chroot'ed environment?
From: marc () tky icdc fr (Marc Samama)
Date: Tue, 18 Apr 1995 21:12:16 +0900

Could someone give me a hint on what security it buys to do a chroot before
servicing a request from a network daemon? I guess it depends on what the
attacker is able to find in the chrooted environment, if he can import 
programs, ...

Also, if it is not too off-topic, what would be the best way to allow syslogs
after a chroot, if the syslog daemon uses unix datagram sockets, that dont
survive the chroot call?

Thank you,


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]