Date: Sun, 3 Nov 1996 13:23:14 -0700 (MST) From: Marc Slemko <marcs@znep.com> To: Dev Chanchani <dev@trifecta.com> Cc: freebsd-security@FreeBSD.org Subject: Re: chroot() security Message-ID: <Pine.BSF.3.95.961103132042.4239G-100000@alive.ampr.ab.ca> In-Reply-To: <Pine.BSF.3.91.961103150038.3636A-100000@www.trifecta.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Check your ptys, ie. /dev/ttyp*. Be sure you have enough of them created in the chrooted /dev/. It may want an /etc/ttys too. When all else fails, do something like add a sleep in there before the telnetd is run and then do a ktrace -i on the process and see what it tries to open just before it dies. On Sun, 3 Nov 1996, Dev Chanchani wrote: > > telnetd@192.168.0.1 : \ > > .example.com : \ > > rfc931 : severity auth.info : \ > > twist = /usr/sbin/chroot /directory/to/chroot/to /usr/libexec/telnetd > > Trying this method, I am getting the error telnetd: all network ports in > use. > > I am sure all network ports are not in use :) > > any ideas? > > Thanks in advance. >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.95.961103132042.4239G-100000>