Re: [PATCH] User chroot

From: Kai Henningsen (kaih@khms.westfalen.de)
Date: Thu Jun 28 2001 - 01:54:00 EST


hpa@zytor.com (H. Peter Anvin) wrote on 27.06.01 in <9hd7pl$86f$1@cesium.transmeta.com>:

> By author: kaih@khms.westfalen.de (Kai Henningsen)

> > jc@lysator.liu.se (Jorgen Cederlof) wrote on 27.06.01 in
> > <20010627014534.B2654@ondska>:
> >
> > > If we only allow user chroots for processes that have never been
> > > chrooted before, and if the suid/sgid bits won't have any effect under
> > > the new root, it should be perfectly safe to allow any user to chroot.
> >
> > Hmm. Dos this work with initrd and root pivoting?
> >
>
> At the moment, yes. Once Viro gets his root-changes in, this breaks,
> since ALL processes will be chrooted.

About what I expected. So you'd really want this flag to be resettable by
root, if you go that way at all. Beginning to look a little too compley, I
think.

The last time, ISTR we discussed some other, similar-but-different
syscalls that made for more secure jails. I don't quite remember the
details, though.

MfG Kai
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Sat Jun 30 2001 - 21:00:18 EST