[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

chrooting daemons



One way to limit damage caused by a daemon with an exploited security
hole is to run it in "jail", chrooted environment. An example is DNS:
http://www.homeport.org/~adam/dns.html

The same mechanism could be used with several other daemons which
do not need to access files outside their running directory (xntpd).
Some daemons need access in some configurations and not in others,
for example apache can be run this way, if you don't need user
home directories.

There are disadvantages: duplicated libraries take disk and memory
space as they are not shared, limitations like above etc. but
I still think this could be an option for some security-conscious
sites.

Some generic support could be included in /sbin/start-stop-daemon
(--run-chrooted-in?), but I guess some policy discussions would
be in order.

-Topi


Reply to: