Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 24 Dec 2011 14:57:18 +0400
From:      Andrey Chernov <ache@FreeBSD.ORG>
To:        Xin LI <delphij@gmail.com>, Kostik Belousov <kostikbel@gmail.com>, Alexander Kabaev <kabaev@gmail.com>, John Baldwin <jhb@FreeBSD.ORG>, Colin Percival <cperciva@FreeBSD.ORG>, src-committers@FreeBSD.ORG, svn-src-all@FreeBSD.ORG, svn-src-head@FreeBSD.ORG
Subject:   Re: svn commit: r228843 - head/contrib/telnet/libtelnet head/crypto/heimdal/appl/telnet/libtelnet head/include head/lib/libc/gen head/lib/libc/iconv head/lib/libc/include head/lib/libc/net head/libexec...
Message-ID:  <20111224105717.GA11193@vniz.net>
In-Reply-To: <20111224105045.GA11127@vniz.net>
References:  <201112231500.pBNF0c0O071712@svn.freebsd.org> <201112231058.46642.jhb@freebsd.org> <201112231122.34436.jhb@freebsd.org> <20111223120644.75fe944d@kan.dyndns.org> <20111223175143.GJ50300@deviant.kiev.zoral.com.ua> <20111224100509.GA98136@vniz.net> <CAGMYy3s4YM-j165o9p%2BEDgMf0%2BaJq7gKj5yR=LK8_yfECnbtog@mail.gmail.com> <20111224103948.GA10939@vniz.net> <CAGMYy3vUMUi0ajADs2AdVRPfWQShmjfXDHfrKTFBmHGiNTWPFA@mail.gmail.com> <20111224105045.GA11127@vniz.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Dec 24, 2011 at 02:50:45PM +0400, Andrey Chernov wrote:
> On Sat, Dec 24, 2011 at 02:45:21AM -0800, Xin LI wrote:
> > On Sat, Dec 24, 2011 at 2:39 AM, Andrey Chernov <ache@freebsd.org> wrote:
> > > On Sat, Dec 24, 2011 at 02:26:20AM -0800, Xin LI wrote:
> > >> chroot(2) can create legitimate and secure environment where dlopen(2)
> > >> is safe and necessary.
> > >
> > > Yes, so ischroot() check can be used only into that places where libc's
> > > libc_dlopen() currently used, i.e. placed into libc_dlopen() itself.
> > 
> > So it's Okay to break NSS in chroot jail?
> 
> We need general solution. We simple can't count all possible and future 
> ftpd's arround the world and insert __FreeBSD_libc_enter_restricted_mode() 
> into them. I even not mention other programs that may use chroot() too. If 
> some component like auth is critical for chroot, it should be restricted 
> in general scope.

To work in admin-think-safe environment we can add another syscall like
safe_chroot(1). When it is marked as safe, ischroot() will return 0.

-- 
http://ache.vniz.net/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20111224105717.GA11193>