delorie.com/archives/browse.cgi   search  
Mail Archives: cygwin/2006/04/05/01:29:59

X-Spam-Check-By: sourceware.org
Message-ID: <443355CC.6000804@etr-usa.com>
Date: Tue, 04 Apr 2006 23:29:48 -0600
From: Warren Young <warren AT etr-usa DOT com>
User-Agent: Thunderbird 1.5 (Windows/20051201)
MIME-Version: 1.0
To: Cygwin-L <cygwin AT cygwin DOT com>
Subject: Re: Setting up chroot jail with cygwin
References: <4433411D DOT 2020207 AT gohilton DOT com> <e0vion$h0b$1 AT sea DOT gmane DOT org>
In-Reply-To: <e0vion$h0b$1@sea.gmane.org>
X-IsSubscribed: yes
Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm
List-Subscribe: <mailto:cygwin-subscribe AT cygwin DOT com>
List-Archive: <http://sourceware.org/ml/cygwin/>
List-Post: <mailto:cygwin AT cygwin DOT com>
List-Help: <mailto:cygwin-help AT cygwin DOT com>, <http://sourceware.org/ml/#faqs>
Sender: cygwin-owner AT cygwin DOT com
Mail-Followup-To: cygwin AT cygwin DOT com
Delivered-To: mailing list cygwin AT cygwin DOT com

Bryan D. Thomas wrote:
> "Kevin Hilton" wrote:
>> Can anyone point me to a link telling me how to set up a chrooted jail
>> with cygwin?
> 
> I used this:
> 
> $ /bin/chroot.exe --help

Can that be relied upon?  chroot is a system call on Unix and Linux, 
which is how it can ensure that the process doesn't step outside the 
box.  Is there a comparable feature in the Windows kernel that provides 
the same feature?  Lacking that, all a determined hacker would have to 
do when attacking a buffer overrun bug is make their injected code first 
attack the cygwin1.dll before doing whatever nefarious task they want to do.

--
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple
Problem reports:       http://cygwin.com/problems.html
Documentation:         http://cygwin.com/docs.html
FAQ:                   http://cygwin.com/faq/

- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019