public inbox for gentoo-security@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-security] mount noexec and ro
@ 2006-11-04 11:11 Joe Knall
  2006-11-04 12:03 ` Wolfram Schlich
  2006-11-04 15:00 ` Paul de Vrieze
  0 siblings, 2 replies; 11+ messages in thread
From: Joe Knall @ 2006-11-04 11:11 UTC (permalink / raw
  To: gentoo-security

Hello,

can/does mounting a partition with noexec, ro etc. provide additional 
security or are those limitations easy to circumvent?

Example: webserver running chrooted
all libs and executables (apache, lib, usr ...) on read only mounted 
partition /srv/www, data dirs (logs, htdocs ...) on 
partition /srv/www/data mounted with noexec (but rw of course), no cgi 
needed.
Server is started with "chroot /srv/www /apache/bin/httpd -k start".

Any cognition? Is this useful, nice, nonsense?
Keeping the chroot updated and so on is not my concern here.

Thanks, Joe
-- 
gentoo-security@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 11+ messages in thread

end of thread, other threads:[~2006-12-09  3:27 UTC | newest]

Thread overview: 11+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-11-04 11:11 [gentoo-security] mount noexec and ro Joe Knall
2006-11-04 12:03 ` Wolfram Schlich
2006-11-04 12:47   ` Eduardo Tongson
2006-11-04 13:27     ` Joe Knall
2006-11-04 15:00 ` Paul de Vrieze
2006-11-04 16:27   ` Joe Knall
2006-11-04 19:03     ` Paul de Vrieze
2006-11-06  5:58       ` Miguel Angel Tormo Alfaro
2006-12-07 17:44     ` Miguel Sousa Filipe
2006-12-09  2:34       ` Joe Knall
     [not found]         ` <20061209031915.506559@host216-188.pool8250.interbusiness.it>
2006-12-09  4:21           ` ascii

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox