The following solution is working very well for me:
To set up a chroot'd environment for real users on a wu-ftpd server, do
the following:
1. Obtain the latest version of wu-ftpd from ftp.wu-ftpd.org (get the
source- I have had problems with the 2.6.0-1.rpm)
2. Build and install wu-ftpd.
3. Follow Michael Brennen's guide at:
http://www.landfield.com/wu-ftpd/guest-howto.html
4. After the above (item 3), add the following for a Linux system. This
works on RedHat 6.1.
- create the lib directory with mode 111
- cd lib
- cp /lib/ld-2.1.1.so .
- cp /lib/libc-2.1.1.so .
- ln -s ld-2.1.1.so ld-linux.so.2
- ln -s libc-2.1.1.so libc.so.6
- chmod 111 ld-2.1.1.so
- chmod 555 libc-2.1.1.so
This should allow real users to log in and be chroot'd to their own home
directory.
Steven
Nat Bayles wrote:
>
> I've got my server up and running with everything working, including
> some virtual domains. My question is, when I have my users log in
> through FTP, they're able to drop down below their home directory (of
> course, revealing everyone elses stuff). I want to stop them from being
> able to drop down below the user directory. How do I do this??????????
>
> This is being done on a linux 5.x server using apache. Any help would be
> greatly appreciated.
>
> --
> To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> as the Subject.
--
Steven W. Schramm | [EMAIL PROTECTED]
CASA, Inc. | Ph : (505) 662-6820 x137
Los Alamos, NM 87544 | Fax: (505) 662-0095
--
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.