Date: Fri, 30 May 1997 07:48:27 +0100 From: Bob Bishop <rb@gid.co.uk> To: "Daniel O'Callaghan" <danny@panda.hilink.com.au> Cc: hackers@FreeBSD.ORG Subject: Re: Correct way to chroot for shell account users? Message-ID: <l03020900afb428738dc8@[194.32.164.2]> In-Reply-To: <Pine.BSF.3.91.970530090251.14689q-100000@panda.hilink.com.au> References: <l03020900afb38f29f0df@[194.32.164.2]>
next in thread | previous in thread | raw e-mail | index | archive | help
At 0:03 +0100 30/5/97, Daniel O'Callaghan wrote: >On Thu, 29 May 1997, Bob Bishop wrote: > >> I'm sure I'm being desperately naive here, but isn't it sufficient for >> safety to make chroot(2) a successful no-op unless / is really / (ie the >> process isn't chrooted already)? > >That means that you can't run anon ftp properly in a chrooted file system, >because ftpd is not allowed to chroot again. Why would you want to do that? -- Bob Bishop (0118) 977 4017 international code +44 118 rb@gid.co.uk fax (0118) 989 4254 between 0800 and 1800 UK
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?l03020900afb428738dc8>