On Fri, 11 Feb 2005, Erno Kuusela wrote:
| [0] 
http://www.debian.org/doc/manuals/securing-debian-howto/ch-sec-services.en.html#s-chroot
|
| There are tools in Debian however, that make it easier to set up
| chroots, such as jailer or jailtool.

you have to separate between packages setting up chroot
environments for eg bind or apache, and on the other hand privsep-like
things where daemons just chroot to empty or near-empty directory with
no additional administrative hassle. the latter is infact done by eg
postfix and sshd in debian... and radvd would, i think, be in the
latter category as well.

bear in mind that the howto referenced above is not any sort of
normative policy spec :)

Yes, I think for the most part, radvd could be in chroot jail.

But there are a couple of issues which might be a bit tricky. In particular, radvd re-reads the configuration file upon HUP. So, I guess that would mean that the config file would have to be moved to the chroot? The pid file would also have to be there, I guess.

A copy of /proc and a couple of /dev/ files are probably easier to arrange.

But I guess patches would be considered. This is something that cannot be done in the generic fashion upstream I think, so it would have to be done in Debian packages. I might end up doing it in the redhat.spec if you do the dirty work and show how these could be automated in a reasonable manner ;-).

--
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings


-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to