|[Home] [Credit Search] [Category Browser] [Staff Roll Call]||The LINUX.COM Article Archive|
|Originally Published: Monday, 29 November 1999||Author: KJ Hartung|
|Published to: news_learn_firststep/Firststep News||Page: 1/1 - [Std View]|
Chroot for BIND
One the concerns of being on the Internet is that you are accessible to the world. If you are not running any services, you don't have anything to worry about, but if you do, the best is to use something called chroot which makes a fake root directory, so if someone compromises the service, the attacker is limited to this directory and doesn't have access to your complete system. This article describes how chroot applies to BIND, in which a new vulnerability has recently been found. Note: This article may be a little complex without previous BIND experience.