On 5/26/05, Stephan Wehner <[EMAIL PROTECTED]> wrote:
> Thanks a lot for your reply. -- Are you saying there is too much
> overhead or the end result is not worth any overhead??
> 
> Why bother chrooting apache, for example, and not leaving it with your
> recommended systrace?
> 
> My question is motivated by exploits through Internet access; it seems
> to me server vulnerabilities are comparable to user's visiting unsafe
> websites / opening unsafe emails, etc. Plus, more and more user
> activity involves Internet access.

I can speak for Mike, but I'd say "both".  In order to give your users
a useable system, you'd have to compy almost everything into the jail,
which would mean maintaining two version of everything. And at the end
of the day, what have you gained?

Look at it this way:  assuming you have any reasonable hardware
policy, any system that a user logs on to with a graphical interface
exists primarily to run user applications--Joe L'User shouldn't be
running a KDE session on any of your file, internet, mail, database,
etc. servers.  So anything that would make a workstation/X server
usable would need to be chrooted.  If it wouldn't need to be chrooted
so the users have access, why have it on that machine at all?  Once
you realize that, you realize that, given the purpose of workstations
and X servers, if anything happens inside the jail, it's just as bad
as if it had happened outside the jail:  you'll just as big a mess on
your hands, because *everything important*--executables, spool files,
password files, log files, all of it--will have to be in the jail. and
if it goes, you will have lost the system for all practical purposes
just as effectively as if the jail weren't in place.

chrooting is a technique to protect leaky programs from remote
attacks; OpenBSD provides other tools--file permissions, file system
flags, etc.--to protect against locl exploits.  Use the appropriate
tools for the job.

The kinds of attacks you're talking about--bad emails, trojan web
pages, etc. may seem like remote attacks, but from an OS standpoint,
they're really not: they originate someplace else, but they trick
users into doing something locally, and they need to be treated as
such.

-- jay
--------------------
daggerquill [at] gmail [dot] com
http://www.engatiki.org

Reply via email to