lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 13 Jul 2007 22:04:20 +0200
From: Paul Sebastian Ziegler <psz@...erved.de>
To: full-disclosure@...ts.grok.org.uk
Subject: White Paper - Chrooting sshd

Sometimes it may become profitable or necessary to jail the ssh daemon
within a chroot. Unluckily there aren't many papers out there that
explain the process of creating an appropriate jail and resolving all
the necessary dependencies and errors.

This paper will show you how to successfully jail sshd itself. Opposed
to many other papers out there it does not try to jail the users after
logging in but rather put the entire daemon into the jail. This approach
is interesting for anybody paranoid enough to want to protect against
remotely exploitable flaws in the used sshd.

Blog-Entry:
https://observed.de/?entnum=55

Download-Area:
https://observed.de/index.html?download

Paper:
https://observed.de/upfiles/chroot_sshd_linux.pdf

Feedback, corrections and constructive criticism are always welcome.

Many Greetings
Paul Sebastian Ziegler

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ