LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 10-25-2014, 12:44 PM   #1
yaplej
Member
 
Registered: Apr 2009
Distribution: CentOS, Ubuntu, openSuSE
Posts: 165
Blog Entries: 1

Rep: Reputation: 22
Partitioning for security or chroot?


Hello everyone,

I want to run some of my own servers that will be publicly accessible. Primarily for Drupal and Gitlab. With the whole shellshock and other pretty nasty security bugs that have been discovered as of late I want to try and lock my systems down as much as possible. So I have already read the SANS, NSA, Redhat, Cisco and others papers/guides on configuring a secure Linux server.

None of them have made mention to running the public services in a chroot jail. Most of them mention partitioning the system so you can use noexec, and other mount flags to prevent applications from running in /tmp, /var/tmp and prevent device drives like /dev/[disk] being mounted to /tmp or /var/tmp.

I am wondering if this is at all necessary if the public application are running in chroot jails. This seems like an even more secure setup than partitioning the system to begin with.

Also as part of my security strategy I am limiting ALL outbound traffic. Unless I have specific need to allow the outbound traffic from my system it gets blocked and logged. This means I can detect (HIDS|OSSEC|Tripwire or whatever) when something "unauthorized" tries to connect outbound from my system (remote code execution like shellshock to "ping" for testing if remote code execution works).

By putting our public facing application in a chroot jail it should also prevent those remote code executions from even running because they would not have access to the executed programs.

So back to my point. Is the partitioning really necessary if your using chroot jailed applications?
 
Old 10-25-2014, 08:22 PM   #2
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,996

Rep: Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628
Not sure a partition helps in attacks versus a mount point that is jailed. In many ways they are the same. Guess it can't hurt and depending on attack could help.

At this point I might have gone to a VM.


Others may have better ideas?
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Security implications of a partitioning scheme ktandel Linux - Security 2 05-14-2014 02:03 PM
LXer: How to Chroot SFTP Users on Linux for maximum security LXer Syndicated Linux News 0 01-20-2014 03:02 AM
Chroot in shell scripts: Ensuring that subsequent commands execute within the chroot Kenny_Strawn Programming 2 05-21-2012 12:25 PM
[SOLVED] in chroot compiled programs do not work in chroot graphit Linux From Scratch 2 04-11-2010 03:04 AM
What is so wrong with chroot as extra security?? helptonewbie Linux - Networking 8 12-13-2007 05:21 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:01 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration