I think the trick is not to run the processes in the chroot as root.

I used a command like this (as root)

/usr/sbin/chroot chroot_directory su - sage -c "sage -c \"$COMMAND\" "

Thus the sage process inside the chroot is run by a user "sage".
I am not sure how secure this is. Any ideas?

Michel


On Oct 5, 8:45 pm, [EMAIL PROTECTED] wrote:
> This was posted to slashdot sometime last week:
>
> http://kerneltrap.org/Linux/Abusing_chroot
>
> The gist: root can trivially break out of the chroot "jail" -- and is then 
> the superuser on the system.  I'm not a security expert, but this sounds only 
> locking the driver's door of a car, and leaving a key on the dash: if a user 
> can escalate to root in the jail, they root the box.
>
> Another slashdot article today made me think about this again:
>
> http://computerworld.co.nz/news.nsf/scrt/CD0B9D97EE6FE411CC25736A000E...
>
> Sure, windows is insecure.  But n00bs like me doing security is insecure no 
> matter what operating system they use.  If the notebook isn't secure, and 
> Sage achieves the BDFL's primary goal, then we'll become a major contributor 
> to the online efforts of organized crime and spam.
>
> So:  what can we use instead?  VMWare?  UML?  SELinux in VMWare running under 
> UML?  Or, will we have to stop executing arbitrary code by unknown public 
> entities again? (I really hate the last option)


--~--~---------~--~----~------------~-------~--~----~
To post to this group, send email to sage-devel@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at http://groups.google.com/group/sage-devel
URLs: http://sage.scipy.org/sage/ and http://modular.math.washington.edu/sage/
-~----------~----~----~----~------~----~------~--~---

Reply via email to