---

LinuxSecurity.com: Using Chroot Securely

[ Thanks to LinuxSecurity Contributor for
this link. ]

“chroot command and chroot system call might sound like
a good security measure – one command executed and plain old UNIX
“cd /” no longer transports you to a root directory of the system.
Instead, you are bound to stay in the restricted part of the
filesystem, surrounded only by files chosen by a paranoid system
administrator. In fact, that is how it should be.

Is it possible to break out of chroot solitary confinement? Yes,
if certain conditions are met. In this paper we will analyze what
chroot is good for and also what chroot is bad for.”


Complete Story

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis