Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 13 Nov 2002 20:46:57 +0100
From:      Poul-Henning Kamp <phk@critter.freebsd.dk>
To:        Matthew Dillon <dillon@apollo.backplane.com>
Cc:        hackers@FreeBSD.ORG
Subject:   Re: tty/pty devices not safe in jail? 
Message-ID:  <98485.1037216817@critter.freebsd.dk>
In-Reply-To: Your message of "Wed, 13 Nov 2002 11:38:33 PST." <200211131938.gADJcX1X091590@apollo.backplane.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <200211131938.gADJcX1X091590@apollo.backplane.com>, Matthew Dillon w
rites:
>:
>:In message <200211131927.gADJRxP8085877@apollo.backplane.com>, Matthew Dillon w
>:rites:
>:>    Hmm.  While tracking down a null mount issue I think I might have
>:>    come across a potentially serious problem with jail.  It seems to
>:>    me that it would be possible for someone inside a jailed environment
>:>    to 'steal' pty's, tty's, or the tty side of a pty that is being
>:>    used from within other jails or by processes outside the jail.  Has
>:>    this ever come up before?
>:
>:There has always been code in kern/tty_pty.c which makes sure that the
>:master and slave have the same prison:
>:
>:        } else if (pti->pt_prison != td->td_ucred->cr_prison) {
>:                return (EBUSY);
>:
>:
>:-- 
>:Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
>:phk@FreeBSD.ORG         | TCP/IP since RFC 956
>
>    Ah, excellent.  Is there a limit inside the prison so a jail cannot
>    exhaust all available ptys?

No.

-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?98485.1037216817>