Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 31 Aug 1998 09:39:34 -0600
From:      "Aaron D. Gifford" <agifford@infowest.com>
To:        security@FreeBSD.ORG
Subject:   Re: Shell history
Message-ID:  <35EAC3B6.258A308D@infowest.com>
References:  <199808310943.LAA00544@CoDe.hu>

next in thread | previous in thread | raw e-mail | index | archive | help

Somebody said:
> > >> Sort of an automated chroot thing you can't bypass I guess.

And Danny responded:
> > >Build a chrooted area with /etc, /bin, /usr/bin, /usr/lib, /usr/libexec
> > >files which are necessary.
> > >Change inetd to run telnetd.sh and have telnetd.sh do:
> > >
> > >-----
> > >#!/bin/sh
> > >cd /newroot
> > >/usr/sbin/chroot . exec /usr/libexec/telnetd
> > >-----
> > >
> > >Danny

And a third party replied:
> > This means that there would be common area for all shell users and I'd
> > wonder if root would be restricted to console and ssh perhaps.

Then Zahemszky Gabor informed:
> In some AT&T Unices (HP, if I know well), this is the job of login:
> if that user has a star ``*'' as shell (the /etc/passwd line of that user
> is like:
> user:passwd:uid:gid:gcos:home:*
> ),
> than login is chroot to home, and start another login, with a /etc/passwd in
> that chrooted environment.  Well, with that way, that user has to type
> two login/passwd sequence, but I think it's not a bad idea.

<<snip>>

I had to set up a chrooted area for a few users recently, so I wrote a shell
wrapper, chrsh.  It chroots to the chroot jail then runs a shell or whatever
within the jail.  See http://www.eq.net/software/chrsh.html for more info. 
Tis FreeBSD specific.  It let me specify which users I wanted chrooted and
which I did not, and it lets the users login via telnet or ssh or whatever.

Aaron out.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?35EAC3B6.258A308D>