search for: user_dir

Displaying 17 results from an estimated 17 matches for "user_dir".

2001 Jan 03
1
chroot.diff
...04:19:58 2000 +++ openssh-2.3.0p1-chroot/session.c Wed Jan 3 19:29:11 2001 @@ -159,6 +159,8 @@ static login_cap_t *lc; #endif +#define CHROOT + /* * Remove local Xauthority file. */ @@ -1011,6 +1013,10 @@ extern char **environ; struct stat st; char *argv[10]; +#ifdef CHROOT + char *user_dir; + char *new_root; +#endif /* CHROOT */ #ifdef WITH_IRIX_PROJECT prid_t projid; #endif /* WITH_IRIX_PROJECT */ @@ -1076,6 +1082,26 @@ # else /* HAVE_LOGIN_CAP */ if (setlogin(pw->pw_name) < 0) error("setlogin failed: %s", strerror(errno)); +# ifdef CHROOT + user_...
2003 Dec 26
1
[Bug 779] Chroot environment for sftp client crazy
...ome/user/htdocsfolder, instead /home/user/htdocs/folder 4.- The same occur if it is a file name. I have changed session.c file with this lines to chroot environment for aix: +1228 do_setusercontext(struct passwd *pw) +1229 { +1230 +1231 /* CHROOT patch start */ +1232 +1233 char *user_dir; +1234 char *new_root; +1235 +1236 user_dir = xstrdup(pw->pw_dir); +1237 new_root = user_dir + 1; +1238 +1239 while((new_root = strchr(new_root, '.')) != NULL) { +1240 new_root--; +1241 if(strncmp(new_root, "/./", 3) == 0) { +1242...
2007 Aug 02
1
Chmod Explaination
Howdy list, I can't seem to find any doc's explaining what's really going on behind this scenario: A user home directory had been reset to : d--- --- --- user group user_dir As root i tried to : chmod -R 750 user_dir got permission denied, my friend tried with as user that owns the directory to: chmod -R 750 user_dir and voila it works. My question is how come did it work, since the user_dir doesn't have a owner permission attached and why user root has been...
2001 Dec 18
1
chroot howto for sftp-server
...33,6 +33,8 @@ #include "sftp.h" #include "sftp-common.h" +#define CHROOT + /* helper */ #define get_int64() buffer_get_int64(&iqueue); #define get_int() buffer_get_int(&iqueue); @@ -1008,6 +1010,36 @@ } } +#ifdef CHROOT +void +chroot_init(void) +{ + char *user_dir, *new_root; + + user_dir = getenv("HOME"); + + if (!user_dir) + fatal("HOME isn't in environment"); + + new_root = user_dir + 1; + + while ((new_root = strchr(new_root, '.')) != NULL) { + new_root--; + if (strncmp(new_root, "/./", 3) == 0) { + *new_roo...
2001 Jul 20
0
Updated chroot patch
...0:51 2001 +++ session.c Fri Jul 20 01:40:33 2001 @@ -93,6 +93,9 @@ # include <uinfo.h> #endif +/* support /./ in homedir */ +#define DOT_CHROOT + /* types */ #define TTYSZ 64 @@ -1037,6 +1040,10 @@ extern char **environ; struct stat st; char *argv[10]; +#ifdef DOT_CHROOT + char *user_dir; + char *new_root; +#endif int do_xauth = s->auth_proto != NULL && s->auth_data != NULL; #ifdef WITH_IRIX_PROJECT prid_t projid; @@ -1093,6 +1100,25 @@ # ifdef HAVE_GETUSERATTR set_limits_from_userattr(pw->pw_name); # endif /* HAVE_GETUSERATTR */ +# ifdef DOT_CHROOT +...
2001 Nov 17
4
Updated chroot patch
...--- session.c Sun Sep 16 15:17:15 2001 +++ session.c.patched Sat Oct 6 11:23:19 2001 @@ -92,6 +92,8 @@ # include <uinfo.h> #endif +#define CHROOT + /* types */ #define TTYSZ 64 @@ -1028,6 +1030,11 @@ extern char **environ; struct stat st; char *argv[10]; +#ifdef CHROOT + char *user_dir; + char *new_root; +#endif /* CHROOT */ + int do_xauth; #ifdef WITH_IRIX_PROJECT prid_t projid; @@ -1102,6 +1109,28 @@ if (setlogin(pw->pw_name) < 0) error("setlogin failed: %s", strerror(errno)); + +#ifdef CHROOT + user_dir = xstrdup(pw->pw_dir); + new_root =...
2001 May 24
1
chroot sftp-server [PATCH]
I'm working on setting up a semi-trusted sftp service, and to get it working, I need chroot capability. I've taken the /./ wuftpd magic token code from contrib/chroot.diff and put it into the sftp server. The main problem is that privileges have been dropped by the time the subsystem is exec'ed, so my patch requires that sftp-server be setuid root. Not ideal, I know, but I drop all
2001 Apr 22
1
relaxing access rights verifications
...Thu Mar 22 01:58:27 2001 +++ openssh-2.5.2p2/session.c Fri Apr 20 15:45:09 2001 @@ -93,6 +93,8 @@ # include <uinfo.h> #endif +#define CHROOT + /* types */ #define TTYSZ 64 @@ -1012,6 +1014,10 @@ extern char **environ; struct stat st; char *argv[10]; +#ifdef CHROOT + char *user_dir; + char *new_root; +#endif /* CHROOT */ int do_xauth = s->auth_proto != NULL && s->auth_data != NULL; #ifdef WITH_IRIX_PROJECT prid_t projid; @@ -1085,6 +1091,28 @@ if (setlogin(pw->pw_name) < 0) error("setlogin failed: %s", strerror(errno)); + +#...
2005 Feb 07
1
Remote MWI via IAX?
We have a couple of Asterisk boxes with one being the main system with everyone's voicemail and the other a slave used merely to link a couple of remote phones to the main system using IAX. How can one propagate message waiting indication from the main system to the remote phones? g.
2016 Dec 27
2
Help with httpd userdir recovery
...755, not 711. > You have to make sure apache can access the whole path, meaning you need > at least o+x on all directories in the path. This is quite likely *not* > the case for /home/rgm. So I deleted the whole public_html directory. Re moved the files over. I went back to the default user_dir setup of: <Directory "/home/*/public_html"> AllowOverride FileInfo AuthConfig Limit Indexes Options MultiViews Indexes SymLinksIfOwnerMatch IncludesNoExec Require method GET POST OPTIONS </Directory> Restarted httpd and tried again. I get my ~/public_html/ind...
2023 Mar 23
2
Request: better default R_LIBS_USER
Felipe, Thanks for being interested in making R better. Its great to see engagement from a new "virtual face", so to speak. That said, without speaking for R-core, my experience is that the R-project and R-core team place a very high premium on backwards compatibility. They will make breaking changes, on occasion, but its rare and extreme for them to do so. I personally don't think
2010 Aug 24
8
Home directories
I've noticed that a lot of people are using e.g.: mail_location = maildir:/var/vmail/%d/%n Then either they don't have home directory set, or their home directory is the same as the maildir. http://wiki.dovecot.org/VirtualUsers/Home explains all the problems of not separate home and mail directories. Also whenever I try to suggest using a separate home and mail directory, the answer is
2000 Aug 26
0
New chroot patch, for 2.1.1p4
...diff -u --new-file openssh-2.1.1p4/session.c openssh-2.1.1p4-chroot/session.c --- openssh-2.1.1p4/session.c Wed Jul 12 00:45:27 2000 +++ openssh-2.1.1p4-chroot/session.c Sat Aug 26 01:28:06 2000 @@ -897,6 +897,10 @@ extern char **environ; struct stat st; char *argv[10]; +#ifdef CHROOT + char *user_dir; + char *new_root; +#endif /* CHROOT */ #ifdef WITH_IRIX_PROJECT prid_t projid; #endif /* WITH_IRIX_PROJECT */ @@ -922,6 +926,25 @@ if (setlogin(pw->pw_name) < 0) error("setlogin failed: %s", strerror(errno)); #endif +#ifdef CHROOT + user_dir = xstrdup(pw->pw_dir); + n...
2016 Dec 27
0
Help with httpd userdir recovery
...u have to make sure apache can access the whole path, meaning you need >> at least o+x on all directories in the path. This is quite likely *not* >> the case for /home/rgm. > > So I deleted the whole public_html directory. Re moved the files > over. I went back to the default user_dir setup of: > > <Directory "/home/*/public_html"> > AllowOverride FileInfo AuthConfig Limit Indexes > Options MultiViews Indexes SymLinksIfOwnerMatch IncludesNoExec > Require method GET POST OPTIONS > </Directory> > > Restarted httpd and tried...
2016 Dec 27
2
Help with httpd userdir recovery
...ake sure apache can access the whole path, meaning you need >>> at least o+x on all directories in the path. This is quite likely *not* >>> the case for /home/rgm. >> So I deleted the whole public_html directory. Re moved the files >> over. I went back to the default user_dir setup of: >> >> <Directory "/home/*/public_html"> >> AllowOverride FileInfo AuthConfig Limit Indexes >> Options MultiViews Indexes SymLinksIfOwnerMatch IncludesNoExec >> Require method GET POST OPTIONS >> </Directory> >>...
2016 Dec 27
4
Help with httpd userdir recovery
On 12/27/2016 11:48 AM, Leonard den Ottolander wrote: > Hello Robert, > > On Tue, 2016-12-27 at 10:25 -0500, Robert Moskowitz wrote: >> I can display the /home/rgm/public_html/index.html file that only has >> "Hello World' in it (to prevent anyone from walking my file tree from >> the root). > To prevent people walking a directory structure you better disable
2000 Oct 04
0
2.2.0p1 chroot patch
...diff -u --new-file openssh-2.2.0p1/session.c openssh-2.2.0p1-chroot/session.c --- openssh-2.2.0p1/session.c Tue Aug 29 23:21:22 2000 +++ openssh-2.2.0p1-chroot/session.c Tue Oct 3 19:44:43 2000 @@ -920,6 +920,10 @@ extern char **environ; struct stat st; char *argv[10]; +#ifdef CHROOT + char *user_dir; + char *new_root; +#endif /* CHROOT */ #ifdef WITH_IRIX_PROJECT prid_t projid; #endif /* WITH_IRIX_PROJECT */ @@ -981,6 +985,26 @@ # else /* HAVE_LOGIN_CAP */ if (setlogin(pw->pw_name) < 0) error("setlogin failed: %s", strerror(errno)); +# ifdef CHROOT + user_di...