From owner-freebsd-questions@FreeBSD.ORG Fri Apr 11 14:37:47 2003 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1BFD437B43A for ; Fri, 11 Apr 2003 14:37:47 -0700 (PDT) Received: from cerebellum.za.net (cerebellum.za.net [196.34.172.103]) by mx1.FreeBSD.org (Postfix) with ESMTP id 1BD6043FD7 for ; Fri, 11 Apr 2003 14:37:46 -0700 (PDT) (envelope-from ian@cerebellum.za.net) Received: from [196.30.239.126] (helo=ian) by cerebellum.za.net with asmtp (TLSv1:RC4-MD5:128) (Exim 3.36 #1) id 1946MJ-000Fvh-00 for questions@freebsd.org; Fri, 11 Apr 2003 21:46:56 +0000 From: "Ian Barnes" To: Date: Fri, 11 Apr 2003 23:37:32 +0200 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 Importance: Normal Subject: Chrooting SSH X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 11 Apr 2003 21:37:47 -0000 Hi, I have a few questions for the brains around. 1.)I am going to set up a shell server. I want to CHRoot the users, and allow them access to certain programs only. There will be different levels on the server, so i want to be able to control what level user can use what program (WOW!). 2.)I also want to implement bandwidth management, please point me in the right direction to finding a good tutorial on how to do this. 3.)What firewall should i use ... IPFW or IPF ? Im not going to be doing NAT, just basic firewalling, but i need it to be secure. Which is the easist to learn etc. 4.)Any Web-Based control pannels that a few "SuperUsers" could use to administor this. (Besides Webmin). 5.)Setting up quotas for each user. Saying X is allowed 10meg while Y is allowed 50meg etc. 6.)Checking how much data they have transferred so we can see if anyone is abusing it. Sorry for the questions, but im still a n00b at this. Thanks for the help. Ian Barnes