Date: Mon, 12 Feb 96 09:56:02 -0800 From: Cy Schubert - BCSC Open Systems Group <cschuber@uumail.gov.bc.ca> To: "az.com" <yankee@anna.az.com> Cc: freebsd-security@FreeBSD.ORG Subject: Re: Need help building jails Message-ID: <199602121756.JAA31080@passer.osg.gov.bc.ca> In-Reply-To: Your message of "Sat, 10 Feb 96 09:49:10 PST." <Pine.BSF.3.91.960210093015.26616C-100000@anna.az.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> > > > 2 questions: > > 1. Haven't been above to build a jail yet with chroot! > [a few lines edited out] > chroot: jail: Operation not permitted. > > I've tried endless permutations of permissions and configurations, > nothing seems to work. If I'm super user, chroot works. Chroot(2) only works if the process calling it has superuser privilege. > > Wanted to put a chroot in the best location, presumably not .login or > .cshrc, but instead right in the /etc/passwd file as what to execute at > login. > > > 2. Can I find code for FreeBSD to do exactly the same thing as chroot with > ftpd? > > 3. Can I find code for FreeBSD to do exactly the same thing as chroot > with httpd? FTPD and HTTPD both run as root. When a connection is accepted, both chroot() and issue a setuid(). An idea would be to create a custom version of telnetd that would spawn a custom version of login which would do a chroot() just prior to doing a setuid(). The advantage is that your custom version of telnetd could replace telnetd in inetd.conf while the original version could be used from a different port. The custom login program could use /usr/local/etc/passwd instead of /etc/passwd limiting access to users within the "jail" environment. Regards, Phone: (604)389-3827 Cy Schubert OV/VM: BCSC02(CSCHUBER) Open Systems Support BITNET: CSCHUBER@BCSC02.BITNET BC Systems Corp. Internet: cschuber@uumail.gov.bc.ca cschuber@bcsc02.gov.bc.ca "Quit spooling around, JES do it."
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602121756.JAA31080>