ChrootDirectory security
Alexander Prinsier
aphexer at mailhaven.com
Mon Mar 30 10:39:56 EST 2009
Damien Miller wrote:
>> I can be sure that there are no setuid binaries in /home, so that rules
>> out some possible vulnerabilities. Could anyone tell me what other
>> problems a non-root-owned chroot directory could create?
>
> Basically because having a non-root-user-writable root directory (i.e.
> what chroot(2) without a root-ownership test gives you) can be exploited
> through setuid programs, and because sshd has no way of determining
> whether setuid programs exist in the chroot.
Thanks!
I'm going to have to modify sshd to remove this root-ownership-check
then. (I'm sure there are no setuid programs in /home, and never will be).
Any chance there would once be an option to turn this check off in the
config file?
Alexander
More information about the openssh-unix-dev
mailing list