On Sun, 19 Jan 2014 07:35:05 -0800
Ben Walton <bdwal...@gmail.com> wrote:

> > I'm getting chroot for some@user when the UID is different than 0.
> > If the UID for some@user is set to 0, I'm no longer getting the
> > chroot and I'm able to browse the whole server.
> 
> What do you expect to achieve by chrooting a uid=0 account? With
> uid=0, it is easy to step out of a chroot...chroot is not a security
> mechanism.

My usage scenario is as follows:

- user rsyncs (or uses sftp) data to a chrooted environment,

- as uid=0, the user is able to keep uids/gids exactly in sync with the
  origin server.


I'm aware that it's trivial to get out of chroot if you have a root
shell, but my impression was that rssh was the tool to prevent it.
Are there any known security issues with rssh which would allow a
chrooted user with uid=0 to bypass chroot? I assume the following:

- allowscp, allowsftp, allowrsync options enabled

- chroot environment read only, except the area where the users puts
  new data


-- 
Tomasz Chmielewski
http://wpkg.org

------------------------------------------------------------------------------
CenturyLink Cloud: The Leader in Enterprise Cloud Services.
Learn Why More Businesses Are Choosing CenturyLink Cloud For
Critical Workloads, Development Environments & Everything In Between.
Get a Quote or Start a Free Trial Today.
http://pubads.g.doubleclick.net/gampad/clk?id=119420431&iu=/4140/ostg.clktrk
_______________________________________________
rssh-discuss mailing list
rssh-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rssh-discuss

Reply via email to