Hello Rudi
On 18 Oct 2003 at 11:23, Rudi Starcevic wrote:
Is there anyway to resistict a non-root user's shell account ?
For example once he/she is logged in is there any way to deny, say,
reading the /etc/passwd file ?
We have a set-up that uses rbash. The client gets rbash as a
login
Hi Ian,
We have a set-up that uses rbash. The client gets rbash as a
login shell and his path is preset to a directory that has a few
chosen executables in it.
Most interesting.
Sounds like it would do just what I want.
I'm on to it.
I suspect a determined hacker could get around this,
Hi,
Though I'd post something I found on the net about rbash.
I haven't tested it yet.
[quote]
But it's possible to get out from this chroot.
woockie_at_twoflower:~$ cd ..
rbash: cd: restricted
woockie_at_twoflower:~$ vi foo
in vi:
:set shell=/bin/sh
:shell
woockie_at_twoflower:~$ cd ..
Hello Rudi
On 21 Oct 2003 at 22:58, Rudi Starcevic wrote:
Though I'd post something I found on the net about rbash.
I haven't tested it yet.
[quote]
But it's possible to get out from this chroot.
woockie_at_twoflower:~$ cd ..
rbash: cd: restricted
woockie_at_twoflower:~$ vi foo
Hi,
Our rbash shells don't have access to vi ... or much else! Their
path is set to /usr/local/lib/rbash-bin/ and that directory has
sym-links to a few selected binaries.
Still I don't regard the rbash setup as secure.
Yes but is sound OK for your needs.
In this case I need, or want, to
I. Forbes wrote:
Our rbash shells don't have access to vi ... or much else! Their path
is set to /usr/local/lib/rbash-bin/ and that directory has sym-links to
a few selected binaries.
BTW
TAB completition works on all directories, so you can discover all files in
systems (in readable
To sumerize the options I've found so far:
a) PAM chroot
b) rbash - restricted shell
c) SSH2 chroot access.
In this case the machine in question is a remote virtual server with
only SSH access. So I think c) may be the go.
If I had local users I guess a) or b) with a) having stronger
* Rudi Starcevic schrieb am 21.10.03 um 16:53 Uhr:
Hi,
Our rbash shells don't have access to vi ... or much else! Their
path is set to /usr/local/lib/rbash-bin/ and that directory has
sym-links to a few selected binaries.
Still I don't regard the rbash setup as secure.
Yes but
Hi,
Did you try c) already? Did it work effectively?
No not yet.
Still in research/checking out the options mode.
but c) is not OpenSSH right?
Correct.
Sorry I forgot to mention that is my options list.
I've only skimmed over the lisence so far. It will require
a closer to make a proper
Hello Rudi
On 18 Oct 2003 at 11:23, Rudi Starcevic wrote:
Is there anyway to resistict a non-root user's shell account ?
For example once he/she is logged in is there any way to deny, say,
reading the /etc/passwd file ?
We have a set-up that uses rbash. The client gets rbash as a
login
Hi Ian,
We have a set-up that uses rbash. The client gets rbash as a
login shell and his path is preset to a directory that has a few
chosen executables in it.
Most interesting.
Sounds like it would do just what I want.
I'm on to it.
I suspect a determined hacker could get around this,
Hi,
Though I'd post something I found on the net about rbash.
I haven't tested it yet.
[quote]
But it's possible to get out from this chroot.
woockie_at_twoflower:~$ cd ..
rbash: cd: restricted
woockie_at_twoflower:~$ vi foo
in vi:
:set shell=/bin/sh
:shell
woockie_at_twoflower:~$ cd ..
Hello Rudi
On 21 Oct 2003 at 22:58, Rudi Starcevic wrote:
Though I'd post something I found on the net about rbash.
I haven't tested it yet.
[quote]
But it's possible to get out from this chroot.
woockie_at_twoflower:~$ cd ..
rbash: cd: restricted
woockie_at_twoflower:~$ vi foo
Hi,
Our rbash shells don't have access to vi ... or much else! Their
path is set to /usr/local/lib/rbash-bin/ and that directory has
sym-links to a few selected binaries.
Still I don't regard the rbash setup as secure.
Yes but is sound OK for your needs.
In this case I need, or want, to
I. Forbes wrote:
Our rbash shells don't have access to vi ... or much else! Their path
is set to /usr/local/lib/rbash-bin/ and that directory has sym-links to
a few selected binaries.
BTW
TAB completition works on all directories, so you can discover all files in
systems (in readable
To sumerize the options I've found so far:
a) PAM chroot
b) rbash - restricted shell
c) SSH2 chroot access.
In this case the machine in question is a remote virtual server with
only SSH access. So I think c) may be the go.
If I had local users I guess a) or b) with a) having stronger
* Rudi Starcevic schrieb am 21.10.03 um 16:53 Uhr:
Hi,
Our rbash shells don't have access to vi ... or much else! Their
path is set to /usr/local/lib/rbash-bin/ and that directory has
sym-links to a few selected binaries.
Still I don't regard the rbash setup as secure.
Yes but
Hi,
Did you try c) already? Did it work effectively?
No not yet.
Still in research/checking out the options mode.
but c) is not OpenSSH right?
Correct.
Sorry I forgot to mention that is my options list.
I've only skimmed over the lisence so far. It will require
a closer to make a proper assesment.
* Rudi Starcevic schrieb am 19.10.03 um 04:30 Uhr:
Thanks Marc,
Thanks also to Russel.
I did it with pam_chroot which is really nice
Great - I'll start looking here.
Currently we only really offer FTP access but would like
to include SSH access too.
I know with the right
Marc,
Thanks.
http://www.grsecurity.net looks very interesting.
Another couple of jobs have popped up which I need to address first
so I don't tihink I'll be working on this 'til later in the week.
When I do I'll be sure to post an update to the list.
Many thanks to you all.
It would not be
Marc,
Thanks.
http://www.grsecurity.net looks very interesting.
Another couple of jobs have popped up which I need to address first
so I don't tihink I'll be working on this 'til later in the week.
When I do I'll be sure to post an update to the list.
Many thanks to you all.
It would not be
Hi Jason,
Let us all know if this works for you, as I (and I think quite a few ppl
that run ISPs) would be interested to know if this actually works or not
For sure.
Will be spending more time on this latter today and will report my
success/failures/questions.
Cheers
Rudi.
--
To UNSUBSCRIBE,
* Rudi Starcevic schrieb am 18.10.03 um 03:23 Uhr:
Hi,
Is there anyway to resistict a non-root user's shell account ?
For example once he/she is logged in is there any way to deny, say,
reading the /etc/passwd file ?
Can they be restricted like the way a user can be restricted using FTP
Thanks Marc,
Thanks also to Russel.
I did it with pam_chroot which is really nice
Great - I'll start looking here.
Currently we only really offer FTP access but would like
to include SSH access too.
I know with the right permissions a user account cannot do
any damage but I would just like
Hi,
Just a quick question on libpam-chroot.
This package is not availalbe in 'stable'.
I've only ever used 'stable'.
It should be OK to grab this package from 'testing' and use it hey ?
Thanks again
Regards Rudi.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe.
Hi,
Just a quick question on libpam-chroot.
This package is not availalbe in 'stable'.
I've only ever used 'stable'.
It should be OK to grab this package from 'testing' and use it hey ?
Usually you can't... as they have dependency problems. What you need is a
backport to stable...
Thanks Jason,
Usually you can't... as they have dependency problems.
Well I think it may be OK to just use the 'testing' .deb.
Why ?
Because I just did.
It all installed OK without any error's.
I just downloaded it and dpkg -i it.
I haven't used it yet as I'm still reading the readme
but it
Hi,
Is there anyway to resistict a non-root user's shell account ?
For example once he/she is logged in is there any way to deny, say,
reading the /etc/passwd file ?
Can they be restricted like the way a user can be restricted using FTP ?
I know I could use a tool like Snort to watch whats
On Sat, 18 Oct 2003 11:23, Rudi Starcevic wrote:
For example once he/she is logged in is there any way to deny, say,
reading the /etc/passwd file ?
Can they be restricted like the way a user can be restricted using FTP ?
I have heard of people setting up chroot environments for ssh accounts
29 matches
Mail list logo