*BSD News Article 74753


Return to BSD News archive

Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!news.mira.net.au!news.mel.connect.com.au!munnari.OZ.AU!news.hawaii.edu!ames!enews.sgi.com!EU.net!sun4nl!beta.nedernet.nl!usenet
From: Gary Howland <gary@systemics.com>
Newsgroups: comp.unix.bsd.freebsd.misc
Subject: Restricted shell or chrooted environment for users?
Date: Fri, 26 Jul 1996 16:01:53 +0200
Organization: Systemics Ltd.
Lines: 17
Message-ID: <31F8CFD1.2781E494@systemics.com>
NNTP-Posting-Host: mainstreet.support.nl
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Mailer: Mozilla 3.0b5a (X11; I; FreeBSD 2.1.0-RELEASE i386)
X-Forwarded: by - (DeleGate2.8.31)

Hi,

What is the "standard" FreeBSD method of restricting users?

There seems to be no facility to allow a login to chroot to
the users directory, nor does there appear to be a standard
restricted shell.

Given the large no of ISPs running FreeBSD, there must be many
who need to offer shell accounts - how are they doing this?

Any suggestions much appreciated,

Gary
--
pub  1024/C001D00D 1996/01/22  Gary Howland <gary@systemics.com>
Key fingerprint =  0C FB 60 61 4D 3B 24 7D  1C 89 1D BE 1F EE 09 06