From owner-freebsd-questions Fri Nov 1 15:02:00 1996 Return-Path: owner-questions Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id PAA20475 for questions-outgoing; Fri, 1 Nov 1996 15:02:00 -0800 (PST) Received: from www.trifecta.com (www.trifecta.com [206.245.150.3]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id PAA20454; Fri, 1 Nov 1996 15:01:55 -0800 (PST) Received: (from dev@localhost) by www.trifecta.com (8.7.5/8.6.12) id RAA07531; Fri, 1 Nov 1996 17:54:31 -0500 (EST) Date: Fri, 1 Nov 1996 17:54:31 -0500 (EST) From: Dev Chanchani To: freebsd-security@freebsd.org cc: freebsd-questions@freebsd.org Subject: chroot() security Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-questions@freebsd.org X-Loop: FreeBSD.org Precedence: bulk We are developing a site which will allow people to access thier pages via telnet. we are going to place them in a chroot() environment giving them access to only critical programs (a la ls, editor, etc.) Does anyone know of any security implecations per say of putting someone in a chroot()'ed environment, and what files must be in their directory for things to function properly? Thanks in advance.