-   Debian (
-   -   chroot installation (

d0127810 07-11-2005 11:11 AM

chroot installation
I have tried long and hard with no success, I'm trying to protect my system against my users using some form of debian chroot.

I went to the debian site:

I've gone to this site attempting G1 and G2 to setup chroot,


I do this to build and install the package

dpkg -i libpam-chroot_0.9-1_i386.deb

With this result

(Reading database ... 59465 files and directories currently installed.)
Preparing to replace libpam-chroot 0.9-1 (using libpam-chroot_0.9-1_i386.deb) ...
Unpacking replacement libpam-chroot ...
dpkg: dependency problems prevent configuration of libpam-chroot:
libpam-chroot depends on libpam0g (>= 0.76); however:
Version of libpam0g on system is 0.72-35.
dpkg: error processing libpam-chroot (--install):
dependency problems - leaving unconfigured
Errors were encountered while processing:


makejail seems to throw back errors while building the sample throws out this error

File /var/chroot/sshd/lib/ already exists
Adding files matching '/dev/pt*'
Checking path '/dev/ptyp0'
Executing : stat -t -c "%t %T" /dev/ptyp0
WARNING: exit code 32512

ERROR: Cannot get the major and minor codes for the file /dev/ptyp0

I could try the third, but it notes that is the hardest way, and I don't want to further cause any uneccessary clutter on box.

I would appreciate any pointers on how to chroot my users in any straight forward fashion.

Thanks in advance

ewt3y 08-06-2005 01:12 AM

Due to ssh's dependencies and the fact that it unlike other servers provides a remote shell to users , creating a restricted environment for it is tough.
chroot run a command in a specified root directory.
ssh : a network protocol in the application layer of ther Internet Protocol suite, It permit a com. to login a net. com. . AAh use tcp port 22.
ssh is linked to sshd for authentication.

All times are GMT -5. The time now is 07:00 PM.