Gentoo Archives: gentoo-hardened

From: Christian Affolter <c.affolter@××××××××××××××.ch>
To: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] to chroot or not to chroot
Date: Wed, 10 Jun 2009 10:49:28
Message-Id: 4A2F8FAF.9080002@stepping-stone.ch
In Reply to: Re: [gentoo-hardened] to chroot or not to chroot by Patrick Grieshaber
1 Hi Jan
2
3 > there are multiple ways to break out of a chroot-jail (example:
4 > http://www.bpfh.net/simes/computing/chroot-break.html). So don't rely
5 > on chroot's "security".
6 >
7 > In my opinion I can't recommend chrooting a apache because:
8 > - time (chrooting apache costs a lot of time)
9 > - complexity -> unstable (if you forget to cpy a lib to the chroot env
10 > apache crashes during usage)
11 > - obsecurity
12 >
13 > If you need a webserver with a good protection you should consider using
14 > SELinux for example. This is a bit better security. But of course - the
15 > complexity is far more harder then a chroot...
16 > If SELinux is too much for you, use a virtual machine and secure the
17 > apache with nice settings, mod_security, php-ids and similiar
18 > technologies. I think I'd do it like that... just my 2 cents.
19
20 Yes, if you would like to have a secure and easy manageable chroot, use
21 Linux-VServer [1] & [2] or OpenVZ [3]. As far as I know at least the
22 Linux-VServer works with a "hardened" Kernel.
23
24
25 > sysspoof
26 >
27 >
28 >> Hello,
29 >> I would like to see some opinions on chrooting -
30 >>
31 >> 1) how big are possible risks of hardened gentoo system compromise,
32 > if apache
33 >> is run normally, therefore a need of chrooting?
34 >>
35 >> 2) suppose I chroot Apache: what chances it still has to harm
36 >> something in the
37 >> outside OS? My knowledge about various system capabilities, network
38 > etc is
39 >> too little, so enlighten me... And how big is an Apache chroot?
40 >>
41 >> And by the way, how big are the risks for sshd and ntpd to open up
42 > a way into
43 >> the hardened gentoo system?
44
45 If you use one of the mentioned virtualization approaches above, the
46 sshd and ntpd daemons are running on the host and aren't
47 required/recommended to run within the chroot (vserver).
48
49
50 > Can that recent ntp glsa be ignored, if its
51 >> hardened with memory protections?
52 >>
53 >> Jan
54
55
56 [1]http://linux-vserver.org
57 [2]http://www.gentoo.org/proj/en/vps/vserver-howto.xml
58 [3]http://wiki.openvz.org
59
60 regards
61 Chris