Date: Mon, 4 Nov 1996 09:48:49 +1030 (CST) From: newton@communica.com.au (Mark Newton) To: dev@trifecta.com (Dev Chanchani) Cc: marcs@znep.com, freebsd-security@freebsd.org Subject: Re: chroot() security Message-ID: <9611032318.AA13474@communica.com.au> In-Reply-To: <Pine.BSF.3.91.961103150038.3636A-100000@www.trifecta.com> from "Dev Chanchani" at Nov 3, 96 03:01:32 pm
next in thread | previous in thread | raw e-mail | index | archive | help
Dev Chanchani wrote: > > telnetd@192.168.0.1 : \ > > .example.com : \ > > rfc931 : severity auth.info : \ > > twist = /usr/sbin/chroot /directory/to/chroot/to /usr/libexec/telnetd > > Trying this method, I am getting the error telnetd: all network ports in > use. You've probably installed tcpd with the "simple" option, which involves replacing your daemons in /usr/libexec/ with a hard link to tcpd, which knows where to find the "real" ones if a connection is permitted. Hence, when you call /usr/libexec/telnetd in the example above, it ends up running recursively. This is probably not what you want :-) Try specifying the path to the "real" telnetd instead (the one in your hide directory, which was configured into tcpd at compile time). > I am sure all network ports are not in use :) I'm willing to believe they are :-) (they'll be mostly in CLOSE_WAIT though) - mark --- Mark Newton Email: newton@communica.com.au Systems Engineer Phone: +61-8-8373-2523 Communica Systems WWW: http://www.communica.com.au
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9611032318.AA13474>