a ssh session in a chroot jail set noexec where files can be
written), and also somewhat easier to setup (maybe not to program though).
Might there be another way to do the mounting so that the user the mounted
file(system) would be able to change the u/gid in the files?
Just a thou
th/without setuid root, inside or outside
a chroot jail with a root or non-root user as it should do.
Kind regards,
Tom Worley
Worley Web Solutions
http://www.worleyweb.net
http://www.totalannihilation2.com
http://www.uk2raq.com
http://projectmist.org
--
To unsubscribe or change options: http:/
(but with only the libs required for rsync, bash and su)
Basically the shell is a wrapper that runs chroot (using sudo privaledges)
then su -'s to the user inside the chroot
You don't have to CC the replies to me as I'm subscribed to the list, but thx
anyhow ;-) (he says replying to
esults, all files are owned by root as rsync is SUID root in the chroot
enviroment. There is an /etc/passwd in there, but only with root and the test
user's entries.
Oh, and I'm using linux 2.4.18 kernel, chroot 2.0.11, rsync 2.5.6CVS (from
debian sid packages)
Regards,
sword securely somehow to each
person). Could it be a bug in the way rsync sets the UID/GID of the files?
Running Debian Linux Sid, up to date as of this morning, and rsync:
rsync version 2.5.6cvs protocol version 26 from debian packages.
Kind regards, and TIA,
Tom Worley
Worley Web Soluti