1 |
Hi Jan |
2 |
|
3 |
> there are multiple ways to break out of a chroot-jail (example: |
4 |
> http://www.bpfh.net/simes/computing/chroot-break.html). So don't rely |
5 |
> on chroot's "security". |
6 |
> |
7 |
> In my opinion I can't recommend chrooting a apache because: |
8 |
> - time (chrooting apache costs a lot of time) |
9 |
> - complexity -> unstable (if you forget to cpy a lib to the chroot env |
10 |
> apache crashes during usage) |
11 |
> - obsecurity |
12 |
> |
13 |
> If you need a webserver with a good protection you should consider using |
14 |
> SELinux for example. This is a bit better security. But of course - the |
15 |
> complexity is far more harder then a chroot... |
16 |
> If SELinux is too much for you, use a virtual machine and secure the |
17 |
> apache with nice settings, mod_security, php-ids and similiar |
18 |
> technologies. I think I'd do it like that... just my 2 cents. |
19 |
|
20 |
Yes, if you would like to have a secure and easy manageable chroot, use |
21 |
Linux-VServer [1] & [2] or OpenVZ [3]. As far as I know at least the |
22 |
Linux-VServer works with a "hardened" Kernel. |
23 |
|
24 |
|
25 |
> sysspoof |
26 |
> |
27 |
> |
28 |
>> Hello, |
29 |
>> I would like to see some opinions on chrooting - |
30 |
>> |
31 |
>> 1) how big are possible risks of hardened gentoo system compromise, |
32 |
> if apache |
33 |
>> is run normally, therefore a need of chrooting? |
34 |
>> |
35 |
>> 2) suppose I chroot Apache: what chances it still has to harm |
36 |
>> something in the |
37 |
>> outside OS? My knowledge about various system capabilities, network |
38 |
> etc is |
39 |
>> too little, so enlighten me... And how big is an Apache chroot? |
40 |
>> |
41 |
>> And by the way, how big are the risks for sshd and ntpd to open up |
42 |
> a way into |
43 |
>> the hardened gentoo system? |
44 |
|
45 |
If you use one of the mentioned virtualization approaches above, the |
46 |
sshd and ntpd daemons are running on the host and aren't |
47 |
required/recommended to run within the chroot (vserver). |
48 |
|
49 |
|
50 |
> Can that recent ntp glsa be ignored, if its |
51 |
>> hardened with memory protections? |
52 |
>> |
53 |
>> Jan |
54 |
|
55 |
|
56 |
[1]http://linux-vserver.org |
57 |
[2]http://www.gentoo.org/proj/en/vps/vserver-howto.xml |
58 |
[3]http://wiki.openvz.org |
59 |
|
60 |
regards |
61 |
Chris |