mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-16 10:20:30 +00:00
Add a warning note to security.jail.allow_raw_sockets
about the risks of enabling raw sockets in prisons. Because raw sockets can be used to configure and interact with various network subsystems, extra caution should be used where privileged access to jails is given out to untrusted parties. As such, by default this option is disabled. A few others and I are currently auditing the kernel source code to ensure that the use of raw sockets by privledged prison users is safe. Approved by: bmilekic (mentor)
This commit is contained in:
parent
7934cbe0d3
commit
8bac4dbf71
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=129909
@ -419,7 +419,10 @@ is set, the source IP addresses are enforced to comply
|
||||
with the IP address bound to the jail, regardless of whether or not
|
||||
the
|
||||
.Dv IP_HDRINCL
|
||||
flag has been set on the socket.
|
||||
flag has been set on the socket. Because raw sockets can be used to configure
|
||||
and interact with various network subsystems, extra caution should be used
|
||||
where privileged access to jails is given out to untrusted parties. As such,
|
||||
by default this option is disabled.
|
||||
.It Va security.jail.getfsstatroot_only
|
||||
This MIB entry determines whether or not processes within a jail are able
|
||||
to see data for all mountpoints.
|
||||
|
Loading…
Reference in New Issue
Block a user