Ok, thanks a lot for your patience with this !

> The kinds of attacks you're talking about--bad emails, trojan web
pages, etc. may seem like remote attacks, but from an OS standpoint,
they're really not: they originate someplace else, but they trick
users into doing something locally, and they need to be treated as
such.

I don't understand -- could you elaborate on "they need to be treated as
such" ?

I wrote earlier :
> Why bother chrooting apache, for example, and not leaving it with your
> recommended systrace?

What's the answer to this one?

I was also toying around with this setup: 

  * One jail for the XServer
  * One jail for the "desktop clients" with the required libraries for
these and not more (no sh, no gcc),
  * and  ssh-xterm-login connect to outside the jail, where all system
files are available

In particular, one directory /jails/xserver/ from the xserver runs, a
directory /jails/xclients/ which has for example the whole gnome
system. It also has a subdirectory /jails/xclients/home/ so that the
home directories are visible from the "desktop". Does that solve your
"and if it goes, you will have lost the system for all practical
purposes just as effectively as if the jail weren't in place." ?

Stephan

On 5/26/05, Jay Savage <[EMAIL PROTECTED]> wrote:
> On 5/26/05, Stephan Wehner <[EMAIL PROTECTED]> wrote:
> > Thanks a lot for your reply. -- Are you saying there is too much
> > overhead or the end result is not worth any overhead??
> >
> > Why bother chrooting apache, for example, and not leaving it with your
> > recommended systrace?
> >
> > My question is motivated by exploits through Internet access; it seems
> > to me server vulnerabilities are comparable to user's visiting unsafe
> > websites / opening unsafe emails, etc. Plus, more and more user
> > activity involves Internet access.
> 
> I can speak for Mike, but I'd say "both".  In order to give your users
> a useable system, you'd have to compy almost everything into the jail,
> which would mean maintaining two version of everything. And at the end
> of the day, what have you gained?
> 
> Look at it this way:  assuming you have any reasonable hardware
> policy, any system that a user logs on to with a graphical interface
> exists primarily to run user applications--Joe L'User shouldn't be
> running a KDE session on any of your file, internet, mail, database,
> etc. servers.  So anything that would make a workstation/X server
> usable would need to be chrooted.  If it wouldn't need to be chrooted
> so the users have access, why have it on that machine at all?  Once
> you realize that, you realize that, given the purpose of workstations
> and X servers, if anything happens inside the jail, it's just as bad
> as if it had happened outside the jail:  you'll just as big a mess on
> your hands, because *everything important*--executables, spool files,
> password files, log files, all of it--will have to be in the jail. and
> if it goes, you will have lost the system for all practical purposes
> just as effectively as if the jail weren't in place.
> 
> chrooting is a technique to protect leaky programs from remote
> attacks; OpenBSD provides other tools--file permissions, file system
> flags, etc.--to protect against locl exploits.  Use the appropriate
> tools for the job.
> 
> The kinds of attacks you're talking about--bad emails, trojan web
> pages, etc. may seem like remote attacks, but from an OS standpoint,
> they're really not: they originate someplace else, but they trick
> users into doing something locally, and they need to be treated as
> such.
> 
> -- jay
> --------------------
> daggerquill [at] gmail [dot] com
> http://www.engatiki.org

Reply via email to