[Bug 582443] Re: Syslog socket missing from chroot.

2011-10-05 Thread Mike Mestnik
I've discovered that a chroot can be escaped by chrooting to any file. I'm interested on how this plays on attempting to protect /dev/log? From what I can gather is that chroots should not be used as a security measure(as they are in this case), but only as a device to run multiple distributions

[Bug 582443] Re: Syslog socket missing from chroot.

2010-05-19 Thread Colin Watson
This is trivially reproducible without the need for configuration files. We should not be wasting bug reporters' time asking them for unnecessary information ... This is a long-standing problem, but I would rather not give the unprivileged network monitor direct access to syslog. Instead, any

[Bug 582443] Re: Syslog socket missing from chroot.

2010-05-19 Thread Mike Mestnik
My strace revealed that sshd was indeed attempting to open this socket and failing. I can see where if a user can inject into sshd that injecting into rsyslog would be trial for this person. I don't fully understand the ramifications of extra code lying around to do things like: 1. Test for the

[Bug 582443] Re: Syslog socket missing from chroot.

2010-05-18 Thread Mike Mestnik
** Attachment added: Dependencies.txt http://launchpadlibrarian.net/48675413/Dependencies.txt -- Syslog socket missing from chroot. https://bugs.launchpad.net/bugs/582443 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openssh in

[Bug 582443] Re: Syslog socket missing from chroot.

2010-05-18 Thread Christopher Hotchkiss
Mike, Could you please post your sshd config file so we can work on reproducing the bug? (It should be /etc/ssh/sshd_config). I'm going to mark it as Incomplete for the meantime. ** Changed in: openssh (Ubuntu) Status: New = Incomplete -- Syslog socket missing from chroot.