Latest LQ Deal: Complete CCNA, CCNP & Red Hat Certification Training Bundle
Go Back > Forums > Linux Forums > Linux - Security
User Name
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.


  Search this Thread
Old 07-12-2003, 08:46 AM   #1
LQ Guru
Registered: Mar 2002
Location: Salt Lake City, UT - USA
Distribution: Gentoo ; LFS ; Kubuntu
Posts: 12,612

Rep: Reputation: 68
chrooting or jailing inetd or inetd started daemons ?

I've spent the better part of several days reading about chrooting processes and security WRT Linux in general. I've found many interesting article and utilities, most of which are in the thread stickied at the top of this forum:
One that really comes to mind over and over is:


Is it possible to chroot inetd (xinetd for those systems that use that instead) or it's daemons that it starts as they are called? The confusion is that the system will see the / directory at the chroot point, so inetd (xinetd) can not really be called since nothing truly exists below the chroot env right?

Thanks for any discussion on this!

Old 07-12-2003, 11:17 AM   #2
Registered: Jul 2003
Location: Florence, Ky
Distribution: CentOS 3.3-4, OpenBSD 3.3, Fedora Core 4, Ubuntu, Novell Open Enterprise Server
Posts: 213

Rep: Reputation: 30
Well theoraticly...

You could chroot xinetd so /chroot/xinetd is seen as /

it could call up something like vsftpd which might be under something like /chroot/xinetd/vsftpd and then chroot vsftpd into it's own directory. I love chroot! I use it for olmost everything "/me = securityfreak" I have also recently been playing around with User Mode Linux.

Imagine running a chroot jail for a server inside UML ... Now thats what I call secure!

Check out Kaladix

This distro is secure to the point that I would call it excessive (olmost!) Kaladis is a nice guy and will help you if he has to time to email you.

Last edited by enigmasoldier; 07-12-2003 at 11:20 AM.
Old 07-15-2003, 06:28 PM   #3
Registered: May 2002
Location: Wales
Distribution: Slack 8.1, Gentoo 1.3a, Red Hat 7.3, Red Hat 7.2, Manrake 8.2
Posts: 328

Rep: Reputation: 30
Not sure but if you copy the all required files for inetd to run and also all daemons and whatever they need into chroot then ammend the start up script in the real filesystem to read something like

chroot /jailedenv /wherever/inetd start (or however u start inetd)

then that should work, this is how i did it with Apache anyway so Id assume its the same sort of principal as by changing the script that starts inetd on boot to point to the chroot env which contains all daemons etc. you want to run your starting it in a chroot env.

hope this is clear and doesent sound like complete rubbish


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
inetd lafuma Slackware 1 04-21-2003 05:15 PM
chrooting daemons markus1982 Linux - Security 2 11-21-2002 12:04 PM
Inetd...What should with it X11 Slackware 3 07-16-2002 03:56 AM
inetd -- where can i get it? jasonhbishop Linux - Software 3 06-06-2002 08:35 AM
inetd tstuhr Linux - Software 3 10-18-2001 09:26 AM > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:44 PM.

Main Menu
Write for LQ is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration