On Wed, 2 Mar 2005, Maarten wrote:

> Out of curiosity, is a 'default' SKAS-enabled guest (and without the host-fs 
> kernel option) safe enough as a sandbox to let untrusted users in, or are 
> additional measures in order to really secure it (or more paranoia ;-) ?
> Ie. how difficult is it to gain access to the host OS from the UML guest?

Here's my take on the issue.  Do other list members have additional or 
contravening insights?  

If a very sharp hacker "gets root" on the UML guest, he can overwrite the 
kernel any way he pleases, executing arbitrary code as the UML special 
user.  If he finds himself in a chroot jail, he can import statically 
linked tools (using ports that have to be open for the guest's mission) and 
perpetrate the same 'sploit against the host.  The jail makes this harder 
but not impossible.

So if there's an exploit in the wild against your kernel version, UML won't 
save you.  However, if you're running a known unsafe service in UML, like a 
honeypot, and the hacker attacks it, he can trash your UML or use it for 
spamming or other evil activities (if the host's firewall allows), but if 
the unsafe service is unavailable on the host, that's as far as he can get.
A chroot jail is (probably) not escapable without being root on the host. 
For recovery it's helpful to have a readonly root filesystem and a COW file 
which is the only thing the hacker can trash.

Am I correct that hostfs is not intrinsically unsafe?  But if your host 
keys or other sensitive data are mode 644 so the UML special user can read 
them, the hacker can steal them, just as could any other compromised 
account.

James F. Carter          Voice 310 825 2897    FAX 310 206 6673
UCLA-Mathnet;  6115 MSA; 405 Hilgard Ave.; Los Angeles, CA, USA  90095-1555
Email: [EMAIL PROTECTED]    http://www.math.ucla.edu/~jimc (q.v. for PGP key)


-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click
_______________________________________________
User-mode-linux-user mailing list
User-mode-linux-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-user

Reply via email to