chroot environment
Rob
listone at deathbeforedecaf.net
Sat Dec 6 17:07:13 PST 2003
If you've already built the environment, you're halfway to having a
jail(8) - this extends chroot(8) by creating a private process tree and
network interface. You can run an entire system inside a jail, including
sshd(8) to accept logins.
For ftp logins, ftpd(8) has builtin support for chrooting certain users -
see ftpchroot(5). There is also support for chrooting logins in the ssh.com
version of sshd - I believe this is /usr/ports/security/ssh2, but I haven't
checked.
Apart from this, I don't know a 'standard' way of doing it.
----- Original Message -----
From: "Nick Twaddell" <nick at webspacesolutions.com>
Subject: chroot environment
> I am trying to setup a chroot environment for some users. I rebuilt the
> environment inside their userdir, copied all the appropriate binaries,
libs,
> etc. The part I am stumped on, is how do you make it so their account
gets
> chrooted on login. Since chroot can only be executed by root. Some of
the
> docs I found created a shell script that would sudo chroot and run it on
> login. I am just wondering what everyone else recommends.
>
> Thanks
>
> Nick Twaddell
>
>
> _______________________________________________
> freebsd-questions at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
"freebsd-questions-unsubscribe at freebsd.org"
>
More information about the freebsd-questions
mailing list