[K12OSN] chroot

Les Mikesell les at futuresource.com
Wed Mar 21 17:54:03 UTC 2007

xmechanic wrote:

> Thank you for your replys.  The way the file system was laid out, I was 
> under the impression that the users would be chrooted into the 
> /opt/ltsp/i386 directory. I'm still a little hazy on the concept of why 
> a terminal user would be able to move to directorys above 
> /opt/ltsp/i386, since that's the only directory that's 'exported', 
> besides the r/o fonts directorys in /usr/** & the swap files Also, in 
> the issue with version 6.0 not working, I tried disabling SElinux and 
> when I did, it evidently broke something, because the system then took 
> like 15 minutes to boot after that. I know files need to be relabeled on 
> reboot, but this was every reboot thereafter, so I finally sidelined it 
> and eventually re-installed the system with Ver. 5.0.  I would still 
> like to know if there is an easy way to chroot a user to his/her 
> directory, yet still be able to access all programs, etc. Thanks again 
> for your help!

No, you can't chroot and still execute programs you can't access. Is 
there some reason you want a chroot environment?   Multiuser unix 
systems have worked this way for decades even in hostile environments 
like schools without many problems.

   Les Mikesell
    les at futuresource.com

More information about the K12OSN mailing list