Chrooted environments are known to greatly improve system and
application security by providing them with a higher degree of
isolation. The objective is to separate as much as possible from
other executables and resources the runtime environment of an
application so that if a hacker get access to it,the rest of the
system is not compromised. This technic is commonly used with
MySQL.
Traditionally, the chrooting applies at the file system level, by creating a separated and minimal operating system disk-image. The operation consists in creating a set of directories (such a /chroot/etc, /chroot/tmp, /chroot/var/tmp, /chroot/usr/local/mysql etc.) and duplicate a minimal number of binary and configuration files into this new directory tree. After setting the right permissions on the new directories, the chrootuid utility is used to execute the application in the restricted environment. …
[Read more]