X-Spam-Check-By: sourceware.org Message-ID: <443355CC.6000804@etr-usa.com> Date: Tue, 04 Apr 2006 23:29:48 -0600 From: Warren Young User-Agent: Thunderbird 1.5 (Windows/20051201) MIME-Version: 1.0 To: Cygwin-L Subject: Re: Setting up chroot jail with cygwin References: <4433411D DOT 2020207 AT gohilton DOT com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-IsSubscribed: yes Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner AT cygwin DOT com Mail-Followup-To: cygwin AT cygwin DOT com Delivered-To: mailing list cygwin AT cygwin DOT com Bryan D. Thomas wrote: > "Kevin Hilton" wrote: >> Can anyone point me to a link telling me how to set up a chrooted jail >> with cygwin? > > I used this: > > $ /bin/chroot.exe --help Can that be relied upon? chroot is a system call on Unix and Linux, which is how it can ensure that the process doesn't step outside the box. Is there a comparable feature in the Windows kernel that provides the same feature? Lacking that, all a determined hacker would have to do when attacking a buffer overrun bug is make their injected code first attack the cygwin1.dll before doing whatever nefarious task they want to do. -- Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple Problem reports: http://cygwin.com/problems.html Documentation: http://cygwin.com/docs.html FAQ: http://cygwin.com/faq/