From owner-freebsd-isp Sat Jul 29 5:28: 0 2000 Delivered-To: freebsd-isp@freebsd.org Received: from atlas.usls.edu (atlas.usls.edu [202.47.133.46]) by hub.freebsd.org (Postfix) with ESMTP id 8E1E237B6BE for ; Sat, 29 Jul 2000 05:27:57 -0700 (PDT) (envelope-from francis@usls.edu) Received: by atlas.usls.edu (Postfix, from userid 1001) id 2E7299B0A; Sat, 29 Jul 2000 20:27:45 +0800 (PHT) Received: from localhost (localhost [127.0.0.1]) by atlas.usls.edu (Postfix) with ESMTP id 229945D07; Sat, 29 Jul 2000 20:27:45 +0800 (PHT) Date: Sat, 29 Jul 2000 20:27:45 +0800 (PHT) From: "Francis A. Vidal" To: "Greg S. Wirth" Cc: FreeBSD ISP Subject: Re: Limiting User Actions In-Reply-To: <521762720.20000727102915@beldamar.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-isp@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org ---- Quoting Greg S. Wirth's message, sent 07/27/00 10:29am ---- > Curious, do these same ideas apply to FTP users as well? Speaking > of non-anonymous users. I am very interested in the locking of > users in their home directories, and not allowing viewing of > system files. I have looked at bash -r & chroot, but would like > some more information on either using shells, or other means at > accomplishing this. Speaking of FTP, you can modify the stock FTP that came with the source to chroot your users to their home directories. Just re-compile `ftpd' with the -DFTPD_INTERNAL_LS option and install it. Consult the man pages for constructing /etc/ftpchroot =) -- francis vidal university of st. la salle, bacolod city, philippines . . . . . . . PGP key available via e-mail / subject: get PGP key u s l s N E T tel nos. (+63.34).433.3526 / fax (+63.34).434.0415 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-isp" in the body of the message