On 5/24/06, Happy Kamote Foundation <[EMAIL PROTECTED]> wrote:
bind-mounting is NOT a PRACTICAL and RECOMMENDED approach in chrooting
a service.

Of course, I will agree whole-heartedly for that, but I never
suggested it to be done for a production service; I simply imagined
that it would be an option that could be taken, in light of the
situation wherein you may have a user or group of users who you want
to pull the chroot tricks off to.  Whether if it is feasible or not
depends on the site's (OP) policy, and not just on some spinster's
cracks book.

Ang bind-mounting naman diba kadalasan ginagamit yan sa
ibang bagay, example : running 32 bit apps on a 64 bit platform sa
debian (yan ha! debian pa yan) pero hindi for security purposes like
JAILING a process.

Yes, that is true; I imagined that a bind-mount of an existing /home
would be nice as a convenience feature, but eventually that would be
improved upon by tightening site policy once migration has been done
(transparently.)

You know what, forget what I said about the bind-mount; if I can't say
what I can imagine would be a `relatively nice' idea without someone
else yapping rudely at my face, then I'd better keep silent.

 Since you mentioned bind-mounting via packaging (chroot/chroot/chroot
haha) Hindi ko makita yung security essence ng ginagawa mo. Ang alam
ko fake-root packaging kadalasan for SANITY purposes, and NOT for
security purposes which is aligned to this topic (e.g. chrooting a
machine with net service such as a webserver)

There wasn't a security essence, for there is none.  Security is just
as strong as the weak link in the chain, and yeah, there is no point
for you (or even me) to discuss anything more about it.

And besides, the thread was about chrooting a user, not just jailing a
process service like FTP or somesuch.  If it were just that, then the
set of considerations for chrooting would have been much, much
smaller, and we wouldn't be dissing off on some petty matter
concerning sudo, chroots and their usage.  However, since this
concerns real users who may be identified as `potentially hostile,'
you will at the very least continue investigation into them without
sounding the alarms...

remember grsec? (oo linux yun e!) ang alam ko isa sa mga SECURITY
feature niya is to PREVENT RECURSIVE CHROOTING. *cough cough*

Yeah, grsec... it has been a long time since I've heard the word.
Thanks for reminding me, I'll try that soon ;-)

as an example if you can give me a ROOT account in your impressively
recursive chroot environment. I can love your linux long time. :)

Careful.  If you have nothing good to say, don't say it at all.  Go
and love your own boxen.

Cheers,

Zakame

--
Zak B. Elep  ||  http://zakame.spunge.org
[EMAIL PROTECTED]  ||  [EMAIL PROTECTED]
1486 7957 454D E529 E4F1  F75E 5787 B1FD FA53 851D
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph

Reply via email to