Add a warning about filesystem-based attacks.
Approved by: mentor (gjb)
This commit is contained in:
parent
e4e5101a06
commit
d86be5e0d9
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/head/; revision=39566
1 changed files with 16 additions and 0 deletions
|
@ -28,6 +28,22 @@
|
|||
are a very powerful tool for system administrators, but their basic
|
||||
usage can also be useful for advanced users.</para>
|
||||
|
||||
<important>
|
||||
<para>Jails are a powerful tool, but they are not a security
|
||||
panacea. It is particularly important to note that while it
|
||||
is not possible for a jailed process to break out on its own,
|
||||
there are several ways in which an unprivileged user outside
|
||||
the jail can cooperate with a privileged user inside the jail
|
||||
and thereby obtain elevated privileges in the host
|
||||
environment.</para>
|
||||
|
||||
<para>Most of these attacks can be mitigated by ensuring that
|
||||
the jail root is not accessible to unprivileged users in the
|
||||
host environment. Regardless, as a general rule, untrusted
|
||||
users with privileged access to a jail should not be given
|
||||
access to the host environment.</para>
|
||||
</important>
|
||||
|
||||
<para>After reading this chapter, you will know:</para>
|
||||
|
||||
<itemizedlist>
|
||||
|
|
Loading…
Reference in a new issue