Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 25 May 1997 17:54:35 -0700 (PDT)
From:      Julian Elischer <julian@current1.whistle.com>
To:        Jaye Mathisen <mrcpu@cdsnet.net>
Cc:        hackers@FreeBSD.ORG
Subject:   Re: Correct way to chroot for shell account users?
Message-ID:  <Pine.BSF.3.95.970525175206.11253A-100000@current1.whistle.com>
In-Reply-To: <Pine.NEB.3.95.970525144745.28807A-100000@mail.cdsnet.net>

next in thread | previous in thread | raw e-mail | index | archive | help


There are several people including myself who have hacked login to chroot
before running the shell

I even had a version that re-red the passwd file in the new chroot
environ and re-read the parameters from there. It turns out to be a very
simple hack.
I can't give code at the moment though..I think I lost it..

julian

On Sun, 25 May 1997, Jaye Mathisen wrote:

> 
> 
> Anybody got any tips on how to write  a secure shell to exec on login to
> set a users environment to the "right thing".
> 
> (I don't mean a rsh type secure shell, but rather a good secure thing
> to have in /etc/master.passwd that execs the real shell in a chroot'd 
> environment.).
> 
> Any code appreciated as well.  Thanks.
> 
> 
> 
> 




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.95.970525175206.11253A-100000>