Return to BSD News archive
Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!news.mira.net.au!news.mel.connect.com.au!munnari.OZ.AU!news.hawaii.edu!ames!enews.sgi.com!EU.net!sun4nl!beta.nedernet.nl!usenet From: Gary Howland <gary@systemics.com> Newsgroups: comp.unix.bsd.freebsd.misc Subject: Restricted shell or chrooted environment for users? Date: Fri, 26 Jul 1996 16:01:53 +0200 Organization: Systemics Ltd. Lines: 17 Message-ID: <31F8CFD1.2781E494@systemics.com> NNTP-Posting-Host: mainstreet.support.nl Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Mailer: Mozilla 3.0b5a (X11; I; FreeBSD 2.1.0-RELEASE i386) X-Forwarded: by - (DeleGate2.8.31) Hi, What is the "standard" FreeBSD method of restricting users? There seems to be no facility to allow a login to chroot to the users directory, nor does there appear to be a standard restricted shell. Given the large no of ISPs running FreeBSD, there must be many who need to offer shell accounts - how are they doing this? Any suggestions much appreciated, Gary -- pub 1024/C001D00D 1996/01/22 Gary Howland <gary@systemics.com> Key fingerprint = 0C FB 60 61 4D 3B 24 7D 1C 89 1D BE 1F EE 09 06