Hi,

on my debian installation, the ovsdb-server is running as root. Since I
prefer to add additional mitigations for running services, I was looking
into putting the ovsdb-server into a chroot and implemented it in the
following three patches.

These patches are send as a request for comments, since there are still
some issues left. The first patch introduces a file descriptor leak, and
some testcases fail when the chroot is enabled (these are 1293 1294 1297
1298 1299 1301  ). If --run-command is passed, the chroot is not active,
since the ovsdb-server requires to access further files.

Is this something worthwile pursuing or are there reasons, why chrooting
was not already implemented for ovsdb-server?

Best Regards,
Eric Sesterhenn

-- 
LSE Leading Security Experts GmbH, Postfach 100121, 64201 Darmstadt
Unternehmenssitz: Weiterstadt, Amtsgericht Darmstadt: HRB8649
Geschäftsführer: Oliver Michel, Sven Walther
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to