Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 8 May 2002 14:43:51 -0600
From:      "Dalin S. Owen" <dowen@pstis.com>
To:        security@freebsd.org
Subject:   Re: Accounts with Restricted privileges 
Message-ID:  <200205081443.51457.dowen@pstis.com>

next in thread | raw e-mail | index | archive | help
On May 8, 2002 10:31 am, Justin King wrote:

Actually.. I am looking for the almost same answer... what about a chroot=
-ed=20
shell?  ie. they can "cd" forwards but not back beyond my designated "/".=
=2E.=20
and I quote (from bash's manpage):

       "When  a command that is found to be a shell script is exe-
       cuted (see COMMAND EXECUTION above), rbash turns  off  any
       restrictions in the shell spawned to execute the script."

I don't want that.  I want all other processes to be chrooted too.  By no=
w=20
some of you are thinking "jail"... A jail won't cut it, because you can't=
 use=20
quotas in a jail.

Does anyone know to do this with bash, or any other shell?  I recall some=
one=20
talking about a shell that could do all of the above.

Thanks! :)

FreeBSD Rox, BTW!

> man bash
>
> RESTRICTED SHELL
>        If bash is started with the name rbash, or the  -r  option
>        is  supplied  at invocation, the shell becomes restricted.
>        A restricted shell is used to set up an  environment  more
>        controlled  than  the  standard shell.  It behaves identi-
>        cally to bash with the exception that  the  following  are
>        disallowed or not performed:
>
>        o      changing directories with cd
>
>        o      setting  or  unsetting  the  values of SHELL, PATH,
>               ENV, or BASH_ENV
>
>        o      specifying command names containing /
>
>        o      specifying a file name containing a / as  an  argu-
>               ment to the .  builtin command
>
>        o      Specifying  a  filename  containing  a  slash as an
>               argument to the -p option to the hash builtin  com-
>               mand
>
>        o      importing function definitions from the shell envi-
>               ronment at startup
>
>        o      parsing the value of SHELLOPTS from the shell envi-
>               ronment at startup
>
>        o      redirecting output using the >, >|, <>, >&, &>, and
>
>               >> redirection operators
>
>        o      using the exec builtin command to replace the shell
>               with another command
>
>        o      adding or deleting builtin commands with the -f and
>               -d options to the enable builtin command
>
>        o      specifying the -p option  to  the  command  builtin
>               command
>
>        o      turning  off  restricted mode with set +r or set +o
>               restricted.
>
>
>
> ----- Original Message -----
> From: "Martin McCormick" <martin@dc.cis.okstate.edu>
> To: <freebsd-security@FreeBSD.ORG>
> Sent: Wednesday, May 08, 2002 12:23 PM
> Subject: Accounts with Restricted privileges
>
> > Is it possible to create an account with a restricted
> > shell?
> >
> > The documentation for bash shows that it can be invoked
> > with the --restricted flag.  A check of the handbook shows
> > nothing more about this topic.  Neither did a look at the man
> > pages for login.
> >
> > Thank you.
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200205081443.51457.dowen>