Linux Today: Linux News On Internet Time.





More on LinuxToday


LinuxSecurity.com: Using Chroot Securely

Feb 12, 2002, 15:01 (8 Talkback[s])
(Other stories by Anton Chuvakin)

WEBINAR: On-demand Event

Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >

[ Thanks to LinuxSecurity Contributor for this link. ]

"chroot command and chroot system call might sound like a good security measure - one command executed and plain old UNIX "cd /" no longer transports you to a root directory of the system. Instead, you are bound to stay in the restricted part of the filesystem, surrounded only by files chosen by a paranoid system administrator. In fact, that is how it should be.

Is it possible to break out of chroot solitary confinement? Yes, if certain conditions are met. In this paper we will analyze what chroot is good for and also what chroot is bad for."

Complete Story

Related Stories: