From owner-freebsd-hackers Mon May 26 02:35:37 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id CAA08921 for hackers-outgoing; Mon, 26 May 1997 02:35:37 -0700 (PDT) Received: from labs.usn.blaze.net.au (labs.usn.blaze.net.au [203.17.53.30]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id CAA08916 for ; Mon, 26 May 1997 02:35:32 -0700 (PDT) Received: from labs.usn.blaze.net.au (local [127.0.0.1]) by labs.usn.blaze.net.au (8.8.5/8.8.5) with ESMTP id TAA00959; Mon, 26 May 1997 19:35:03 +1000 (EST) Message-Id: <199705260935.TAA00959@labs.usn.blaze.net.au> X-Mailer: exmh version 2.0gamma 1/27/96 To: Julian Elischer cc: Jaye Mathisen , hackers@FreeBSD.ORG Subject: Re: Correct way to chroot for shell account users? In-reply-to: Your message of "Sun, 25 May 1997 17:54:35 MST." X-Face: (W@z~5kg?"+5?!2kHP)+l369.~a@oTl^8l87|/s8"EH?Uk~P#N+Ec~Z&@;'LL!;3?y Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Mon, 26 May 1997 19:35:02 +1000 From: David Nugent Sender: owner-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk > There are several people including myself who have hacked login to chroot > before running the shell > > I even had a version that re-red the passwd file in the new chroot > environ and re-read the parameters from there. It turns out to be a very > simple hack. FWIW, this is the sort of thing that login.conf's shell= variable was invented for. Regards, David David Nugent - Unique Computing Pty Ltd - Melbourne, Australia Voice +61-3-9791-9547 Data/BBS +61-3-9792-3507 3:632/348@fidonet davidn@freebsd.org davidn@blaze.net.au http://www.blaze.net.au/~davidn/