LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Slackware (https://www.linuxquestions.org/questions/slackware-14/)
-   -   Jailkit on Slackware 12.1 (https://www.linuxquestions.org/questions/slackware-14/jailkit-on-slackware-12-1-a-677161/)

dhupke 10-17-2008 01:39 PM

Jailkit on Slackware 12.1
 
I'm attempting to install Jailkit 2.5 on my Slackware 12.1 box. My goal is to setup a secure FTP server that forces users to stay in their /home directory and does not allow them to browse.

I've attempted to install using the documentation here, http://olivier.sessink.nl/jailkit/index.html#intro, but no luck. I followed the installation steps, but when I try to connect via command line (sftp test@localhost) I get the message "Couldn't read packet: Connection reset by peer"

Maybe there's a better or simpler solution with Slackware 12.1??

Any help would be appreciated.

Thanks,
Dave

ChrisAbela 10-20-2008 06:26 AM

This might interest you (especially the last few postings):

http://www.linuxquestions.org/questi...-users-676440/

Chris

dhupke 10-20-2008 01:08 PM

jailkit
 
Thanks, I'll take a look at this.

Mellar 10-22-2008 05:12 PM

I just want to add that chroot isn't secure, and that's one of the reasons why we have these other jail solutions. Take a look at the freebsd handbook for an explanation: http://www.freebsd.org/doc/en_US.ISO...ils-intro.html

Debian and some other distributions make jails easier to set up, because of their preconfigured philosophy and large repositories. With Slackware you are pretty much on you own to solve this, and that's why I like the BSDs for this purpose. But it's your box, and you decides how secure it's going to be. Maybe a simple chroot environment solves your needs?

dhupke 10-23-2008 07:47 AM

jailkit
 
I will take a look at FreeBSD, I am open to any and all suggestions.

Thanks

keefaz 10-23-2008 09:17 AM

Quote:

Originally Posted by Mellar (Post 3319118)
...With Slackware you are pretty much on you own to solve this

I is not really hard to do, though
Just add a line in /etc/vsftpd.conf (chroot_local_user=YES)
Also, you said "chroot isn't secure", but it's a bit generalized imho,
in the case of vsftpd, please post a security link with vsftpd chroot users exploit


All times are GMT -5. The time now is 06:42 PM.