Ummm sorry but i think you have goten this backwards it is more secure to
chdir, then chrrot, not chroot then chdir I believe what you have here is
backwards
As we all know, the chroot can be escaped because the sample
program doesn't change the current working directory, and it's
Umm I think you have gotten this backwards, it is more secure to chdir first
then chroot I think you have this backwards. in my virtual environment
i chdir working dir, then chroot... ive not been able to escape my
chrooted jail setup yet. nor have i seen any code that will
I actually currently use
-SNIP - EDITED FOR SECURITY -
syslog (LOG_NOTICE,"Changing directory/root to %s",path
if (chdir (path) || chroot (path)) return 1;
}else{
syslog (LOG_NOTICE,"No ("EDITED FOR SECURITY" )
there is a simplistic way to create chrooted/jailed virtual servers for many clients
domains... without getting into the nasty of bsd code i do it daily with one small
program.. and have all services available to many virtual customers/domains on a box.
that to the customer looks like 1
4 matches
Mail list logo