Re: chroot could chdir? (was Re: about jail)

1999-09-27 Thread Julian Elischer
I read it as her talking about chroot in general. On Mon, 27 Sep 1999, Poul-Henning Kamp wrote: In message [EMAIL PROTECTED], Julian Elischer writes: You have to examine ALL fd's in case one has a directory open that is outside the chroot.. (see man fchdir(2)) We do. See source.

Re: chroot could chdir? (was Re: about jail)

1999-09-27 Thread Poul-Henning Kamp
In message [EMAIL PROTECTED], Julian Elischer writes: I read it as her talking about chroot in general. We do. See source. :-) On Mon, 27 Sep 1999, Poul-Henning Kamp wrote: In message [EMAIL PROTECTED], Julian Elischer writes: You have to examine ALL fd's in case one has a directory

Re: chroot could chdir? (was Re: about jail)

1999-09-27 Thread Carol Deihl
Hello, I was referring to the practice of chdir-ing to someplace within the chrooted area right *after* doing the chroot, before doing anything else. Otherwise, the current working directory may be pointing to a directory *outside* the chrooted area. Of course, if you set the current working

Re: chroot could chdir? (was Re: about jail)

1999-09-27 Thread Carol Deihl
Poul-Henning Kamp wrote: In message [EMAIL PROTECTED], Julian Elischer writes: I read it as her talking about chroot in general. Yep, I was. We do. See source. :-) Are you talking about the new jail() call only, or does this apply to chroot() (especially in 3.2) ? (And I am looking in

Re: about jail

1999-09-26 Thread Daniel C. Sobral
Alexander Bezroutchko wrote: And /proc/PID/status must show this value. It already does. ... vm1# cat /proc/$$/status zsh 480 479 479 440 5,2 ctty 938282449,544330 0,55195 0,55194 pause 0 0 0,0,0,2,3,4,5,20,31 vm1

Re: about jail

1999-09-26 Thread Alexander Bezroutchko
And your point is? Do the base system or another jail show qwerty too? I think we are talking about slightly different things. I know that jailed process can not change base system's hostname. But it can change it's own. Sometimes it is necessary to obtain the list of processes which belongs to

chroot could chdir? (was Re: about jail)

1999-09-26 Thread Carol Deihl
Alexander Bezroutchko wrote: it is possible to escape from jail Following program escapes from jail (tested under 4.0-19990918-CURRENT): [snip program code that chroot's but doesn't then chdir inside the new area] As we all know, the chroot can be escaped because the sample program doesn't

Re: chroot could chdir? (was Re: about jail)

1999-09-26 Thread TrouBle
Ummm sorry but i think you have goten this backwards it is more secure to chdir, then chrrot, not chroot then chdir I believe what you have here is backwards As we all know, the chroot can be escaped because the sample program doesn't change the current working directory, and it's

Re: chroot could chdir? (was Re: about jail)

1999-09-26 Thread TrouBle
Umm I think you have gotten this backwards, it is more secure to chdir first then chroot I think you have this backwards. in my virtual environment i chdir working dir, then chroot... ive not been able to escape my chrooted jail setup yet. nor have i seen any code that will

Re: chroot could chdir? (was Re: about jail)

1999-09-26 Thread TrouBle
I actually currently use -SNIP - EDITED FOR SECURITY - syslog (LOG_NOTICE,"Changing directory/root to %s",path if (chdir (path) || chroot (path)) return 1; }else{ syslog (LOG_NOTICE,"No ("EDITED FOR SECURITY" )

Re: chroot could chdir? (was Re: about jail)

1999-09-26 Thread Julian Elischer
You have to examine ALL fd's in case one has a directory open that is outside the chroot.. (see man fchdir(2)) julian On Sun, 26 Sep 1999, Carol Deihl wrote: Alexander Bezroutchko wrote: it is possible to escape from jail Following program escapes from jail (tested under

Re: chroot could chdir? (was Re: about jail)

1999-09-26 Thread Poul-Henning Kamp
In message [EMAIL PROTECTED], Julian Elischer writes: You have to examine ALL fd's in case one has a directory open that is outside the chroot.. (see man fchdir(2)) We do. See source. -- Poul-Henning Kamp FreeBSD coreteam member [EMAIL PROTECTED] "Real hackers run

about jail

1999-09-25 Thread Alexander Bezroutchko
Hello, I am looking for a way to use jail feature (when it will be back ported to -STABLE) for providing virtual servers with root access (something like www.servetheweb.com). Therefore I am investigating this feature more closely. For now I have encountered following problems: * ping,

Re: about jail

1999-09-25 Thread Poul-Henning Kamp
In message [EMAIL PROTECTED], Alexander Bezroutchko writes: * ping, traceroute doesn't work due to lack of permissionis to create icmp socket. I think it is simple to make workaround for such problems: create a daemon listening on a unix domain socket for request from a jail. Daemon will take

Re: about jail

1999-09-25 Thread Harold Gutch
On Sat, Sep 25, 1999 at 05:17:12PM +0400, Alexander Bezroutchko wrote: * it is possible to escape from jail Following program escapes from jail (tested under 4.0-19990918-CURRENT): /* --- start of example - */ #include unistd.h #include assert.h const char

Re: about jail

1999-09-25 Thread Jacques Vidrine
On 25 September 1999 at 15:38, Harold Gutch [EMAIL PROTECTED] wrote: I don't run -CURRENT, so I can't test this - but this is the standard chroot()-breakout, and you're saying that using it you can break out of a _jail_ aswell ? Or are you simply mixing up jail() and chroot() ? bye,

Re: about jail

1999-09-25 Thread TrouBle
there is a simplistic way to create chrooted/jailed virtual servers for many clients domains... without getting into the nasty of bsd code i do it daily with one small program.. and have all services available to many virtual customers/domains on a box. that to the customer looks like 1

Re: about jail

1999-09-25 Thread Rodney W. Grimes
[CC: trimmied to -hackers, long lines wrapped, and much content deleted] there is a simplistic way to create chrooted/jailed virtual servers for many clients domains... without getting into the nasty of bsd code i do it daily with one small program.. and have all services available to

Re: about jail

1999-09-25 Thread Alexander Bezroutchko
On Sun, Sep 26, 1999 at 03:51:54PM -0500, TrouBle wrote: there is a simplistic way to create chrooted/jailed virtual servers for many clients domains... without getting into the nasty of bsd code i do it daily with one small program.. and have all services available to many virtual

Re: about jail

1999-09-25 Thread Alexander Bezroutchko
127.0.0.1 is mapped to the jail address. telnet localhost does what you'd expect it to. but bind() to 127.0.0.1 fails ;( It's called "p_prison-pr_host" and it was there from day #1. And /proc/PID/status must show this value. It already does.