Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 30 May 1997 07:48:27 +0100
From:      Bob Bishop <rb@gid.co.uk>
To:        "Daniel O'Callaghan" <danny@panda.hilink.com.au>
Cc:        hackers@FreeBSD.ORG
Subject:   Re: Correct way to chroot for shell account users?
Message-ID:  <l03020900afb428738dc8@[194.32.164.2]>
In-Reply-To: <Pine.BSF.3.91.970530090251.14689q-100000@panda.hilink.com.au>
References:  <l03020900afb38f29f0df@[194.32.164.2]>

next in thread | previous in thread | raw e-mail | index | archive | help
At 0:03 +0100 30/5/97, Daniel O'Callaghan wrote:
>On Thu, 29 May 1997, Bob Bishop wrote:
>
>> I'm sure I'm being desperately naive here, but isn't it sufficient for
>> safety to make chroot(2) a successful no-op unless / is really / (ie the
>> process isn't chrooted already)?
>
>That means that you can't run anon ftp properly in a chrooted file system,
>because ftpd is not allowed to chroot again.

Why would you want to do that?


--
Bob Bishop              (0118) 977 4017  international code +44 118
rb@gid.co.uk        fax (0118) 989 4254  between 0800 and 1800 UK





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?l03020900afb428738dc8>