Date: Tue, 13 Oct 1998 09:18:00 -0700 (PDT) From: David Wolfskill <dhw@whistle.com> To: freebsd-isp@FreeBSD.ORG, rezidew@kemicol.rezidew.net Subject: Re: CHROOT'd environments Message-ID: <199810131618.JAA20364@pau-amma.whistle.com> In-Reply-To: <199810130418.XAA06571@kemicol.rezidew.net>
next in thread | previous in thread | raw e-mail | index | archive | help
>Date: Mon, 12 Oct 1998 23:18:03 -0500 (CDT) >From: Graphic Rezidew <rezidew@kemicol.rezidew.net> >The problem that I am running into is that it appears that only root can run >chroot. If there is a shell that allows chroot'd logins please let me know The chroot() system call may only be invokoed by a process with effective uid of 0 (root). Thus, any such shell would either need to be invoked by root or would need to be setuid root. The former would not seem to be a useful exercise. The latter, though tricky, may be doable; you would need to write your own program which would set up the chroot'ed environment, perform the chroot, and then relinquish root privileges irrevocably. It would probably also exec a more common shell just before giving the user control. You would need to be certain that the program will handle various conditions, some of which may well be pathological, in a known and acceptable manner. Good luck, david -- David Wolfskill UNIX System Administrator dhw@whistle.com voice: (650) 577-7158 pager: (650) 371-4621 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-isp" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199810131618.JAA20364>