The following solution is working very well for me:

To set up a chroot'd environment for real users on a wu-ftpd server, do
the following:

1. Obtain the latest version of wu-ftpd from ftp.wu-ftpd.org (get the
source- I have had problems with the 2.6.0-1.rpm)
2. Build and install wu-ftpd.
3. Follow Michael Brennen's guide at:
                http://www.landfield.com/wu-ftpd/guest-howto.html
4. After the above (item 3), add the following for a Linux system. This
works on RedHat 6.1.
        - create the lib directory with mode 111
        - cd lib
        - cp /lib/ld-2.1.1.so .
        - cp /lib/libc-2.1.1.so .
        - ln -s ld-2.1.1.so ld-linux.so.2
        - ln -s libc-2.1.1.so libc.so.6
        - chmod 111 ld-2.1.1.so
        - chmod 555 libc-2.1.1.so

This should allow real users to log in and be chroot'd to their own home
directory.

Steven

Nat Bayles wrote:
> 
> I've got my server up and running with everything working, including
> some virtual domains. My question is, when I have my users log in
> through FTP, they're able to drop down below their home directory (of
> course, revealing everyone elses stuff). I want to stop them from being
> able to drop down below the user directory. How do I do this??????????
> 
> This is being done on a linux 5.x server using apache. Any help would be
> greatly appreciated.
> 
> --
> To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> as the Subject.

-- 
Steven W. Schramm          | [EMAIL PROTECTED]
CASA, Inc.                 | Ph : (505) 662-6820 x137
Los Alamos, NM 87544       | Fax: (505) 662-0095


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to