user mapping

2002-06-21 Thread Tom Worley
a ssh session in a chroot jail set noexec where files can be written), and also somewhat easier to setup (maybe not to program though). Might there be another way to do the mounting so that the user the mounted file(system) would be able to change the u/gid in the files? Just a thou

Re: UID/GID bug in chrooted shells fixed.

2002-06-14 Thread Tom Worley
th/without setuid root, inside or outside a chroot jail with a root or non-root user as it should do. Kind regards, Tom Worley Worley Web Solutions http://www.worleyweb.net http://www.totalannihilation2.com http://www.uk2raq.com http://projectmist.org -- To unsubscribe or change options: http:/

Re: Possible UID/GID bug in chrooted shells?

2002-06-13 Thread Tom Worley
(but with only the libs required for rsync, bash and su) Basically the shell is a wrapper that runs chroot (using sudo privaledges) then su -'s to the user inside the chroot You don't have to CC the replies to me as I'm subscribed to the list, but thx anyhow ;-) (he says replying to

Re: Possible UID/GID bug in chrooted shells?

2002-06-11 Thread Tom Worley
esults, all files are owned by root as rsync is SUID root in the chroot enviroment. There is an /etc/passwd in there, but only with root and the test user's entries. Oh, and I'm using linux 2.4.18 kernel, chroot 2.0.11, rsync 2.5.6CVS (from debian sid packages) Regards,

Possible UID/GID bug in chrooted shells?

2002-06-11 Thread Tom Worley
sword securely somehow to each person). Could it be a bug in the way rsync sets the UID/GID of the files? Running Debian Linux Sid, up to date as of this morning, and rsync: rsync version 2.5.6cvs protocol version 26 from debian packages. Kind regards, and TIA, Tom Worley Worley Web Soluti