I have tried long and hard with no success, I'm trying to protect my system against my users using some form of debian chroot.
I went to the debian site:
I've gone to this site attempting G1 and G2 to setup chroot,
I do this to build and install the package
dpkg -i libpam-chroot_0.9-1_i386.deb
With this result
(Reading database ... 59465 files and directories currently installed.)
Preparing to replace libpam-chroot 0.9-1 (using libpam-chroot_0.9-1_i386.deb) ...
Unpacking replacement libpam-chroot ...
dpkg: dependency problems prevent configuration of libpam-chroot:
libpam-chroot depends on libpam0g (>= 0.76); however:
Version of libpam0g on system is 0.72-35.
dpkg: error processing libpam-chroot (--install):
dependency problems - leaving unconfigured
Errors were encountered while processing:
makejail seems to throw back errors while building the sample throws out this error
File /var/chroot/sshd/lib/libnss_db.so.2 already exists
Adding files matching '/dev/pt*'
Checking path '/dev/ptyp0'
Executing : stat -t -c "%t %T" /dev/ptyp0
WARNING: exit code 32512
ERROR: Cannot get the major and minor codes for the file /dev/ptyp0
I could try the third, but it notes that is the hardest way, and I don't want to further cause any uneccessary clutter on box.
I would appreciate any pointers on how to chroot my users in any straight forward fashion.
Thanks in advance
Due to ssh's dependencies and the fact that it unlike other servers provides a remote shell to users , creating a restricted environment for it is tough.
chroot run a command in a specified root directory.
ssh : a network protocol in the application layer of ther Internet Protocol suite, It permit a com. to login a net. com. . AAh use tcp port 22.
ssh is linked to sshd for authentication.
|All times are GMT -5. The time now is 02:37 PM.|