On Sat, May 11, 2019 at 5:56 AM Niklas Keller <m...@kelunik.com> wrote:

> > I'm against deprecating it or removing it.
> >
> > As said earlier, it has some security value, especially with mass
> > hosting. If I'm hosting thousands of websites for thousands of users,
> > using chroot is not doable, and open_basedir is a good alternative (at
> > least it's better than nothing).
> >
> > That's why it's used by ISPconfig and other panels: there is no other
> > solution that I know of.
>
> That's exactly the reason why I'm for removing it. There will always
> be ways to circumvent open_basedir and setups like this are insecure.
> It gives a false sense of security. It's not better than nothing,
> because most hosting providers would opt for a real solution instead
> of leaving users entirely unprotected.
>

Under VM setup, there is not much problem for linux.
However, docker (and/or cgroup based containers) has problem because
there is no namespace for selinux. Therefore, containers cannot have
workable selinux protection, as well as OSes that lacks selinux like
protections.

I don't care much about open_basedir.
However, I wonder how many container setups relay on open_basedir as
additional security.

Regards,

P.S. Anyone shouldn't rely on stack smashing attack protection, yet
it's still there for sail safe purpose. open_basedir is fail safe feature.

--
Yasuo Ohgaki
yohg...@ohgaki.net

Reply via email to