Using chroot() (was:) Secure (regular) Scripts

Rich Geiger rmg at ultra.com
Fri Dec 22 03:40:33 AEST 1989


martin at mwtech.UUCP (Martin Weitzel) writes:
>You should *very* strongly consider, to let those unprotected guest
>logins run in a 'chroot'-ed environment.

Seems like a very good precaution!

>It requires a little bit of thinking, which commands should be
>placed into the 'chroot'-ed environment, because clearly the
>"/bin", "/usr/bin" -Directories would no longer be accessible,
>from a new root, say "/usr/guestroot".

Also, in some environments with shared libraries (for example SunOS
4.x), you will need to include a usr/lib directory and the necessary
components (ld.so, libc.so.*) used to bind shared libraries at exec
time.
-- 
 - Rich Geiger
Disclaimer: [please refer to ANSI draft "Standard Disclaimer" Rev 3.12-B/89]
Ultra Network Technologies / 101 Daggett Drive / San Jose CA 95134
rmg at ultra.com  ...!ames!ultra!rmg  (408) 922-0100 [w]  (408) 739-7911 [h]



More information about the Comp.unix.wizards mailing list