Displaying 11 results from an estimated 11 matches for "chroot_dir".
2004 Aug 06
0
[PATCH] Configurable privileges and chroot jail
Hi,
This patch (against the current CVS tree) is intended to add secure
configuration to icecast 'out of the box'. It adds two configuration
directives, 'icecast_user' and 'chroot_dir'. These are intended to be
used together to reduce the privileges icecast runs under to the
minimum necessary. When this is enabled and run as root icecast will
enter the specified chroot jail and drop privileges to the user
specified.
The chroot_dir option will probably not work if --enable...
2002 Jul 04
4
Chroot patch (v3.4p1)
The following is a patch I've been working on to support a "ChrootUser"
option in the sshd_config file.
I was looking for a way to offer sftp access and at the same time restict
interactive shell access. This patch is a necessary first step (IMO).
It applies clean with 'patch -l'.
Also attached is a shell script that helps to build a chrooted home dir on
a RedHat 7.2
2003 Apr 15
1
PATCH allow_zero_gid option
...1.10
diff -u -3 -p -r1.10 restrict-access.c
--- src/lib/restrict-access.c 4 Mar 2003 04:00:13 -0000 1.10
+++ src/lib/restrict-access.c 15 Apr 2003 17:37:26 -0000
@@ -31,12 +31,14 @@
#include <grp.h>
void restrict_access_set_env(const char *user, uid_t uid, gid_t gid,
- const char *chroot_dir)
+ const char *chroot_dir, int allow_zg)
{
if (user != NULL && *user != '\0')
env_put(t_strconcat("RESTRICT_USER=", user, NULL));
if (chroot_dir != NULL && *chroot_dir != '\0')
env_put(t_strconcat("RESTRICT_CHROOT=", chroot_dir,...
2017 Feb 20
3
[Bug 2681] New: postauth processes to log via monitor
https://bugzilla.mindrot.org/show_bug.cgi?id=2681
Bug ID: 2681
Summary: postauth processes to log via monitor
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2004 Aug 06
0
No subject
This patch (against the current CVS tree) is intended to add secure
configuration to icecast 'out of the box'. It adds two configuration
directives, 'icecast_user' and 'chroot_dir'. These are intended to be
used together to reduce the privileges icecast runs under to the
minimum necessary. When this is enabled and run as root icecast will
enter the specified chroot jail and drop privileges to the user
specified.
The chroot_dir option will probably not work if --e...
2003 Jul 11
2
Permission denied
Dovecot is faulting on an error about permissions that it shouldn't do.
I've got an user with its home dir with permissions 700, and inside the
mail directory with the mboxes.
In the error log I can see: 'Can't chdir to /home/user. Permission denied'
I wonder why it has to chdir to that directory and why it can't access.
Shouldn't it be running as the user?
2003 Sep 10
1
Patch for auto-creating home directories
...const char *executable, const char *module_dir,
unsigned int process_size, int process_type,
***************
*** 156,164 ****
--- 192,205 ----
restrict_process_size(process_size, (unsigned int)-1);
+ (void)umask(set->umask);
+
if (*home_dir != '\0') {
full_home_dir = *chroot_dir == '\0' ? home_dir :
t_strconcat(chroot_dir, "/", home_dir, NULL);
+ if (set->parent_dir_umask != 0777 &&
+ !create_directories(full_home_dir, set->parent_dir_umask)) +
i_fatal("mkdir(%s) failed: %m", full_home_dir);
if (chdir(full_home_...
2002 Aug 08
0
Probable bug in Chroot patch (v3.4p1)
...trying to get the patch to work on one of my AIX hosts (4.3.3),
I discovered what is probably a bug in the section of code in session.c.
for (i = 0; i < options.num_chroot_users; i++) {
if (match_user(pw->pw_name, hostname, ipaddr,
options.chroot_users[i])) {
dir = chroot_dir(pw);
/* 'dir' now points to memory block holding pathname */
new_home = dir;
/* contents of 'dir' pointer copied to 'new_home' pointer */
xfree(dir);
/* memory block with pathname freed */
if(chdir(new_home) == -1)
/* now trying to refer...
2008 Jun 20
1
ForceCommand internal-sftp causes sftp logging to fail (openssh-5.0p1)
...========#
Subsystem sftp internal-sftp -f AUTHPRIV -l VERBOSE
Match User fredwww
ChrootDirectory %h
#ForceCommand internal-sftp
#================================================#
If I un-comment ForceCommand internal-sftp, syslog no longer
logs activity from internal-sftp.
I have the <CHROOT_DIR>/dev/log setup with my syslog, and as I
said, without ForceCommand it works fine.
I looked through the source, but am not super c savvy so I could
not see why this would cause a problem, but I think it has to do with
the -f -l arguments not getting through properly to sftp-server.
I would be...
2015 Apr 19
2
yum install failiure - CentOS-7 - Base
------------ Original Message ------------
> Date: Sunday, April 19, 2015 18:44:43 +0000
> From: Sarogahtyp <sarogahtyp at web.de>
> To: centos at centos.org
> Subject: [CentOS] yum install failiure - CentOS-7 - Base
>
> I have a running CentOS 6.5 64-bit system running and i like to
> have a CentOS 7 chrooted system inside.
> Ive done that chroot environment as
2018 Jun 25
2
Samba 4.7.1 Generating Core Dumps
...t;return> to quit---
locaddr = 0x55b48e612800 "`\341\314 \302\177"
remaddr = <optimized out>
ret = <optimized out>
status = <optimized out>
tv = {tv_sec = 1529777922, tv_usec = 319131}
now = <optimized out>
chroot_dir = 0x55b48e5fa6d0 "\306\016\212 \302\177"
rc = <optimized out>
__func__ = "smbd_process"
__FUNCTION__ = "smbd_process"
#35 0x000055b48c66d1d4 in smbd_accept_connection (ev=0x55b48e5f3520, fde=<optimized out>, flags=<optimized out&g...