[K12OSN] chroot

Les Mikesell les at futuresource.com
Wed Mar 21 17:54:03 UTC 2007


xmechanic wrote:

> Thank you for your replys.  The way the file system was laid out, I was 
> under the impression that the users would be chrooted into the 
> /opt/ltsp/i386 directory. I'm still a little hazy on the concept of why 
> a terminal user would be able to move to directorys above 
> /opt/ltsp/i386, since that's the only directory that's 'exported', 
> besides the r/o fonts directorys in /usr/** & the swap files Also, in 
> the issue with version 6.0 not working, I tried disabling SElinux and 
> when I did, it evidently broke something, because the system then took 
> like 15 minutes to boot after that. I know files need to be relabeled on 
> reboot, but this was every reboot thereafter, so I finally sidelined it 
> and eventually re-installed the system with Ver. 5.0.  I would still 
> like to know if there is an easy way to chroot a user to his/her 
> directory, yet still be able to access all programs, etc. Thanks again 
> for your help!

No, you can't chroot and still execute programs you can't access. Is 
there some reason you want a chroot environment?   Multiuser unix 
systems have worked this way for decades even in hostile environments 
like schools without many problems.

-- 
   Les Mikesell
    les at futuresource.com




More information about the K12OSN mailing list