Displaying 17 results from an estimated 17 matches for "user_dir".
2001 Jan 03
1
chroot.diff
...04:19:58 2000
+++ openssh-2.3.0p1-chroot/session.c Wed Jan 3 19:29:11 2001
@@ -159,6 +159,8 @@
static login_cap_t *lc;
#endif
+#define CHROOT
+
/*
* Remove local Xauthority file.
*/
@@ -1011,6 +1013,10 @@
extern char **environ;
struct stat st;
char *argv[10];
+#ifdef CHROOT
+ char *user_dir;
+ char *new_root;
+#endif /* CHROOT */
#ifdef WITH_IRIX_PROJECT
prid_t projid;
#endif /* WITH_IRIX_PROJECT */
@@ -1076,6 +1082,26 @@
# else /* HAVE_LOGIN_CAP */
if (setlogin(pw->pw_name) < 0)
error("setlogin failed: %s", strerror(errno));
+# ifdef CHROOT
+ user_...
2003 Dec 26
1
[Bug 779] Chroot environment for sftp client crazy
...ome/user/htdocsfolder,
instead /home/user/htdocs/folder
4.- The same occur if it is a file name.
I have changed session.c file with this lines to chroot environment for aix:
+1228 do_setusercontext(struct passwd *pw)
+1229 {
+1230
+1231 /* CHROOT patch start */
+1232
+1233 char *user_dir;
+1234 char *new_root;
+1235
+1236 user_dir = xstrdup(pw->pw_dir);
+1237 new_root = user_dir + 1;
+1238
+1239 while((new_root = strchr(new_root, '.')) != NULL) {
+1240 new_root--;
+1241 if(strncmp(new_root, "/./", 3) == 0) {
+1242...
2007 Aug 02
1
Chmod Explaination
Howdy list,
I can't seem to find any doc's explaining what's really going on behind
this scenario:
A user home directory had been reset to :
d--- --- --- user group user_dir
As root i tried to :
chmod -R 750 user_dir
got permission denied, my friend tried with as user that owns the directory
to:
chmod -R 750 user_dir and voila it works.
My question is how come did it work, since the user_dir doesn't have a owner
permission attached and why user root has been...
2001 Dec 18
1
chroot howto for sftp-server
...33,6 +33,8 @@
#include "sftp.h"
#include "sftp-common.h"
+#define CHROOT
+
/* helper */
#define get_int64() buffer_get_int64(&iqueue);
#define get_int() buffer_get_int(&iqueue);
@@ -1008,6 +1010,36 @@
}
}
+#ifdef CHROOT
+void
+chroot_init(void)
+{
+ char *user_dir, *new_root;
+
+ user_dir = getenv("HOME");
+
+ if (!user_dir)
+ fatal("HOME isn't in environment");
+
+ new_root = user_dir + 1;
+
+ while ((new_root = strchr(new_root, '.')) != NULL) {
+ new_root--;
+ if (strncmp(new_root, "/./", 3) == 0) {
+ *new_roo...
2001 Jul 20
0
Updated chroot patch
...0:51 2001
+++ session.c Fri Jul 20 01:40:33 2001
@@ -93,6 +93,9 @@
# include <uinfo.h>
#endif
+/* support /./ in homedir */
+#define DOT_CHROOT
+
/* types */
#define TTYSZ 64
@@ -1037,6 +1040,10 @@
extern char **environ;
struct stat st;
char *argv[10];
+#ifdef DOT_CHROOT
+ char *user_dir;
+ char *new_root;
+#endif
int do_xauth = s->auth_proto != NULL && s->auth_data != NULL;
#ifdef WITH_IRIX_PROJECT
prid_t projid;
@@ -1093,6 +1100,25 @@
# ifdef HAVE_GETUSERATTR
set_limits_from_userattr(pw->pw_name);
# endif /* HAVE_GETUSERATTR */
+# ifdef DOT_CHROOT
+...
2001 Nov 17
4
Updated chroot patch
...--- session.c Sun Sep 16 15:17:15 2001
+++ session.c.patched Sat Oct 6 11:23:19 2001
@@ -92,6 +92,8 @@
# include <uinfo.h>
#endif
+#define CHROOT
+
/* types */
#define TTYSZ 64
@@ -1028,6 +1030,11 @@
extern char **environ;
struct stat st;
char *argv[10];
+#ifdef CHROOT
+ char *user_dir;
+ char *new_root;
+#endif /* CHROOT */
+
int do_xauth;
#ifdef WITH_IRIX_PROJECT
prid_t projid;
@@ -1102,6 +1109,28 @@
if (setlogin(pw->pw_name) < 0)
error("setlogin failed: %s", strerror(errno));
+
+#ifdef CHROOT
+ user_dir = xstrdup(pw->pw_dir);
+ new_root =...
2001 May 24
1
chroot sftp-server [PATCH]
I'm working on setting up a semi-trusted sftp service, and to get it
working, I need chroot capability.
I've taken the /./ wuftpd magic token code from contrib/chroot.diff and
put it into the sftp server. The main problem is that privileges have
been dropped by the time the subsystem is exec'ed, so my patch requires
that sftp-server be setuid root. Not ideal, I know, but I drop all
2001 Apr 22
1
relaxing access rights verifications
...Thu Mar 22 01:58:27 2001
+++ openssh-2.5.2p2/session.c Fri Apr 20 15:45:09 2001
@@ -93,6 +93,8 @@
# include <uinfo.h>
#endif
+#define CHROOT
+
/* types */
#define TTYSZ 64
@@ -1012,6 +1014,10 @@
extern char **environ;
struct stat st;
char *argv[10];
+#ifdef CHROOT
+ char *user_dir;
+ char *new_root;
+#endif /* CHROOT */
int do_xauth = s->auth_proto != NULL && s->auth_data != NULL;
#ifdef WITH_IRIX_PROJECT
prid_t projid;
@@ -1085,6 +1091,28 @@
if (setlogin(pw->pw_name) < 0)
error("setlogin failed: %s", strerror(errno));
+
+#...
2005 Feb 07
1
Remote MWI via IAX?
We have a couple of Asterisk boxes with one being the main system with
everyone's voicemail and the other a slave used merely to link a couple
of remote phones to the main system using IAX.
How can one propagate message waiting indication from the main system to
the remote phones?
g.
2016 Dec 27
2
Help with httpd userdir recovery
...755, not 711.
> You have to make sure apache can access the whole path, meaning you need
> at least o+x on all directories in the path. This is quite likely *not*
> the case for /home/rgm.
So I deleted the whole public_html directory. Re moved the files over.
I went back to the default user_dir setup of:
<Directory "/home/*/public_html">
AllowOverride FileInfo AuthConfig Limit Indexes
Options MultiViews Indexes SymLinksIfOwnerMatch IncludesNoExec
Require method GET POST OPTIONS
</Directory>
Restarted httpd and tried again. I get my ~/public_html/ind...
2023 Mar 23
2
Request: better default R_LIBS_USER
Felipe,
Thanks for being interested in making R better. Its great to see engagement
from a new "virtual face", so to speak. That said, without speaking for
R-core, my experience is that the R-project and R-core team place a very
high premium on backwards compatibility. They will make breaking changes,
on occasion, but its rare and extreme for them to do so. I personally
don't think
2010 Aug 24
8
Home directories
I've noticed that a lot of people are using e.g.:
mail_location = maildir:/var/vmail/%d/%n
Then either they don't have home directory set, or their home directory
is the same as the maildir. http://wiki.dovecot.org/VirtualUsers/Home
explains all the problems of not separate home and mail directories.
Also whenever I try to suggest using a separate home and mail directory,
the answer is
2000 Aug 26
0
New chroot patch, for 2.1.1p4
...diff -u --new-file openssh-2.1.1p4/session.c openssh-2.1.1p4-chroot/session.c
--- openssh-2.1.1p4/session.c Wed Jul 12 00:45:27 2000
+++ openssh-2.1.1p4-chroot/session.c Sat Aug 26 01:28:06 2000
@@ -897,6 +897,10 @@
extern char **environ;
struct stat st;
char *argv[10];
+#ifdef CHROOT
+ char *user_dir;
+ char *new_root;
+#endif /* CHROOT */
#ifdef WITH_IRIX_PROJECT
prid_t projid;
#endif /* WITH_IRIX_PROJECT */
@@ -922,6 +926,25 @@
if (setlogin(pw->pw_name) < 0)
error("setlogin failed: %s", strerror(errno));
#endif
+#ifdef CHROOT
+ user_dir = xstrdup(pw->pw_dir);
+ n...
2016 Dec 27
0
Help with httpd userdir recovery
...u have to make sure apache can access the whole path, meaning you need
>> at least o+x on all directories in the path. This is quite likely *not*
>> the case for /home/rgm.
>
> So I deleted the whole public_html directory. Re moved the files
> over. I went back to the default user_dir setup of:
>
> <Directory "/home/*/public_html">
> AllowOverride FileInfo AuthConfig Limit Indexes
> Options MultiViews Indexes SymLinksIfOwnerMatch IncludesNoExec
> Require method GET POST OPTIONS
> </Directory>
>
> Restarted httpd and tried...
2016 Dec 27
2
Help with httpd userdir recovery
...ake sure apache can access the whole path, meaning you need
>>> at least o+x on all directories in the path. This is quite likely *not*
>>> the case for /home/rgm.
>> So I deleted the whole public_html directory. Re moved the files
>> over. I went back to the default user_dir setup of:
>>
>> <Directory "/home/*/public_html">
>> AllowOverride FileInfo AuthConfig Limit Indexes
>> Options MultiViews Indexes SymLinksIfOwnerMatch IncludesNoExec
>> Require method GET POST OPTIONS
>> </Directory>
>>...
2016 Dec 27
4
Help with httpd userdir recovery
On 12/27/2016 11:48 AM, Leonard den Ottolander wrote:
> Hello Robert,
>
> On Tue, 2016-12-27 at 10:25 -0500, Robert Moskowitz wrote:
>> I can display the /home/rgm/public_html/index.html file that only has
>> "Hello World' in it (to prevent anyone from walking my file tree from
>> the root).
> To prevent people walking a directory structure you better disable
2000 Oct 04
0
2.2.0p1 chroot patch
...diff -u --new-file openssh-2.2.0p1/session.c openssh-2.2.0p1-chroot/session.c
--- openssh-2.2.0p1/session.c Tue Aug 29 23:21:22 2000
+++ openssh-2.2.0p1-chroot/session.c Tue Oct 3 19:44:43 2000
@@ -920,6 +920,10 @@
extern char **environ;
struct stat st;
char *argv[10];
+#ifdef CHROOT
+ char *user_dir;
+ char *new_root;
+#endif /* CHROOT */
#ifdef WITH_IRIX_PROJECT
prid_t projid;
#endif /* WITH_IRIX_PROJECT */
@@ -981,6 +985,26 @@
# else /* HAVE_LOGIN_CAP */
if (setlogin(pw->pw_name) < 0)
error("setlogin failed: %s", strerror(errno));
+# ifdef CHROOT
+ user_di...