Date: Wed, 16 Sep 1998 10:02:45 +1000 (EST) From: "Daniel O'Callaghan" <danny@hilink.com.au> To: Robert Adams <radams@siscom.net> Cc: freebsd-isp@FreeBSD.ORG Subject: Re: Chroot + Freebsd Message-ID: <Pine.BSF.3.96.980916095500.24097D-100000@enya.hilink.com.au> In-Reply-To: <059801bddc31$f5ecffa0$28abf4ce@mp.siscom.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 9 Sep 1998, Robert Adams wrote: > Was wondering is anything is running chroot'ed virtual servers.. we are > thinking of moving all our vitual servers into a virtual environment so that > they each have there own little system going on..then using something like > xinetd to all the servers for each.. anyone done this? I started doing this 4 years ago, and I'm still doing it. It's easy to hack apache to chroot itself into /chrootdir/192.168.1.1. Note that you'll need to start a separate instance of apache for each VWS. It's also easy to hack inetd to use getsockname(2) to find out the local IP address and chroot in the child before execing telnetd or ftpd. This is getting to be a FAQ. Maybe I should write a Handbook section on it.... Danny To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-isp" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980916095500.24097D-100000>