On 5/26/05, Stephan Wehner <[EMAIL PROTECTED]> wrote: > Thanks a lot for your reply. -- Are you saying there is too much > overhead or the end result is not worth any overhead?? > > Why bother chrooting apache, for example, and not leaving it with your > recommended systrace? > > My question is motivated by exploits through Internet access; it seems > to me server vulnerabilities are comparable to user's visiting unsafe > websites / opening unsafe emails, etc. Plus, more and more user > activity involves Internet access.
I can speak for Mike, but I'd say "both". In order to give your users a useable system, you'd have to compy almost everything into the jail, which would mean maintaining two version of everything. And at the end of the day, what have you gained? Look at it this way: assuming you have any reasonable hardware policy, any system that a user logs on to with a graphical interface exists primarily to run user applications--Joe L'User shouldn't be running a KDE session on any of your file, internet, mail, database, etc. servers. So anything that would make a workstation/X server usable would need to be chrooted. If it wouldn't need to be chrooted so the users have access, why have it on that machine at all? Once you realize that, you realize that, given the purpose of workstations and X servers, if anything happens inside the jail, it's just as bad as if it had happened outside the jail: you'll just as big a mess on your hands, because *everything important*--executables, spool files, password files, log files, all of it--will have to be in the jail. and if it goes, you will have lost the system for all practical purposes just as effectively as if the jail weren't in place. chrooting is a technique to protect leaky programs from remote attacks; OpenBSD provides other tools--file permissions, file system flags, etc.--to protect against locl exploits. Use the appropriate tools for the job. The kinds of attacks you're talking about--bad emails, trojan web pages, etc. may seem like remote attacks, but from an OS standpoint, they're really not: they originate someplace else, but they trick users into doing something locally, and they need to be treated as such. -- jay -------------------- daggerquill [at] gmail [dot] com http://www.engatiki.org

