|
Message-ID: <51B152CE.20209@redhat.com> Date: Thu, 06 Jun 2013 21:26:06 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: chroots & uid sharing -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 06/06/2013 12:17 PM, Seth Arnold wrote: > On Thu, Jun 06, 2013 at 03:02:37PM +0200, Jason A. Donenfeld > wrote: >> What I wonder is how many distros are shipping various daemons >> that run under the nobody user, with certain ones chrooting and >> others not. How should we handle this? > > We can handle nobody well enough by correcting its mis-use every > time we spot it. There are enough purpose-specific users on a > typical system these days to just give the impression that any new > service should get its own corresponding user, so the temptation to > use 'nobody' is lower than it used to be. > > Of course, if a different user account gets abused for both > chrooted and non-chrooted use, that's harder to combat, short of > reminding people that chroot is filesystem and _only_ filesystem.. I literally can't remember when people started saying "if you're using chroot for security, you're doing it wrong" it was a long time ago. At least a decade for myself and I wasn't the first person (that probably goes to the BSD guys and jail()): http://seclists.org/vuln-dev/2002/May/419 - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJRsVLNAAoJEBYNRVNeJnmTFzkQAIeHqk2uSmK2wKqP9o3CQ0JG GcY21kKwl/JyBSqgsLQutDp7sdqrngK+Dcti/W/JICacvPO+rHfgh7UI5bYX8FuL AiXW4jc5Sn7s3SfWWGEizur8bz7GAxhEy/Jy3h8w8ZIry0ufXbgigyBv+xT3qoZG 8L4Kd+88V03kpt478IQNsOAgvlv20vY16mz7JLTXdEKECBHJxhD454nPLGtvfcSc pmZ+g2TzGBniR0KzwKqtiPSbgBW+Edx/RaQ+nZFdJmL9BF6DX6fGwf4potOZ8lTa whYi5Kzcabdlv8QXQ12HHNmJ13DH2qz42B55AIb222g2HntB/RTA2m7+Od8K2vJw kR4NDOrtzUYB9xOSFKe3YTNeM+0n+BcRwagoUjQXLijCdIXH/Qgoht8N18943v6w xq4K/MwL1EO57jyuGhADMKBnQ0ZX9SsKKwGccYjM0JqGYv/j5Usz8Pv+100GKNOn bOK0ToBHZClhGMsFSOpFDw8IWIZ/OwOWDUgO5hcj/Go5m6kDZUilJTY2JqOI/3o2 fxC76SWbAy3sM4hs2/mIUsPJDauESzezU4IZ+w5qqIXXs3r1zyu7yRbAc/cQ6543 /QVp737RSsxGlaarelytXmBvGWgob7hw9tBAq93LR1zyY2uYv3AErWeDit3LL8ju QVa2pPNX+5RZuByj7JZ/ =WFp/ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.