logoalt Hacker News

0cf8612b2e1e11/07/20242 repliesview on HN

I thought a chroot was not considered a real security boundary?


Replies

ronsor11/07/2024

Chroot is a real security boundary as long as you use it properly. That said, namespaces on Linux are much superior at this point, so I can only recommend using `chroot` for POSIX compliance.

show 1 reply
kevincox11/10/2024

Yes. Anything that shares a kernel is a very weak security boundary as the kernel is complex and vulnerabilities are regularly discovered.