[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: OpenBSD rootkit?
On Sun, Jul 14, 2002, Jolan Luff wrote:
> ssh -> privsep
> apache -> chroot
Chroot provides almost no extra security. It can be abused in many
ways when attacker gets uid=0 inside. And this is possible with a little
help from kernel bugs.
Jail(2) syscall from FreeBSD provides limited environment and the
*real* security for imprisoning processes.
> there's no promises. just a humble mention of "1 remote hole in 6
> years". pretty damn good.
This claim is wrong, OpenSSH was vulnerable to CRC32 integer overflow
two years ago.
* Fido: 2:480/124 ** WWW: http://www.frasunek.com/ ** NIC-HDL: PMF9-RIPE *
* Inet: email@example.com ** PGP: D48684904685DF43EA93AFA13BE170BF *