From owner-freebsd-questions Wed Jan 10 20:20:52 2001 Delivered-To: freebsd-questions@freebsd.org Received: from hawk-systems.com (hawk-systems.com [161.58.152.235]) by hub.freebsd.org (Postfix) with ESMTP id 2912037B400 for ; Wed, 10 Jan 2001 20:20:34 -0800 (PST) Received: from server0 (cr901664-a.pr1.on.wave.home.com [24.112.146.66]) by hawk-systems.com (8.8.8) id VAA34948 for ; Wed, 10 Jan 2001 21:18:52 -0700 (MST) From: "Dave VanAuken" To: Subject: chrooting ftp/telnet/ssh connections based on ip address requested Date: Wed, 10 Jan 2001 23:27:41 -0500 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0) In-Reply-To: <01011019005201.67997@galaxy.anchoragerescue.org> X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Importance: Normal Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG based on the domain name accessing the server(or IP address) how can we capture and chroot the user to the appropriate directory tree initial thoughts are having inetd dump all requests on the appropriate port to a shell script which would determine the requested addr and chroot the shell or ftpd from there to the appropriate tree... rather than reinventing the wheel, are there any well documented examples along this line? Particularly for telnet and ftp (without having to install custom ftp applications). (no "man jail" answers please) thx Dave To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message