• The APS Catalog has been deprecated and removed from all Plesk Obsidian versions.
    Applications already installed from the APS Catalog will continue working. However, Plesk will no longer provide support for APS applications.
  • Please be aware: with the Plesk Obsidian 18.0.78 release, the support for the ngx_pagespeed.so module will be deprecated and removed from the sw-nginx package.

chroot security questions

wduric

New Pleskian
Dears,

I have plesk 12.0 and discovered in directory /var/www/vhosts/chroot following:
drwxr-xr-x. 3 root root 4096 Feb 1 12:57 bin
drwxr-xr-x. 2 root root 4096 Feb 1 12:57 dev
drwxr-xr-x. 2 root root 4096 Feb 1 12:57 etc
drwxr-xr-x. 2 root root 4096 Feb 1 12:57 lib
drwxr-xr-x. 2 root root 4096 Feb 1 12:57 lib64
drwxrwxrwt. 2 root root 4096 Feb 1 12:57 tmp
drwxr-xr-x. 4 root root 4096 Feb 1 12:57 usr
drwxr-xr-x. 3 root root 4096 Feb 1 12:57 var

in ./bin I can even find
-rwxr-xr-x. 1 root root 52656 Jun 22 2012 touch

knowing that touch can be use to change the date of a file, I wonder if there is not a security danger of having all these commands available on chroot.

I have been searching if I shoud not better to restrict the execution of some exe to only root userid.

Should I take some actions with these directories ? what is your point of vue ?
 
Back
Top