AboutWelcome to Free Software Daily (FSD). FSD is a hub for news and articles by and for the free and open source community. FSD is a community driven site where members of the community submit and vote for the stories that they think are important and interesting to them. Click the "About" link to read more...
Running Linux system inside a chroot environment allows a system admin to decrease an impact on a production server when the server gets compromised. Change root will change root directory to all current running processes and its children to a chroot jail.
One concern when users FTP into your server, is that by default users who have accounts can roam your server to view contents of files. VSFTPD by default does not allow user logins, it allows anonymous by default. Anonymous users by default are locked into the directory that they login to. This is exactly what you would want.
So the goal of this post will be to install a 32-bit chroot of 9.10 in my fresh install of 10.04 as 9.10 is easier to build and test Cyanogen's custom Android rom. I have modified some guides from here and here. I have also elected to use schroot as it allows for easy chroot access.
Irssi is a popular IRC client. Its a very popular client for small window managers like fluxbox. This short howto will walk you though the steps for setting up a jail that only has a few commands in it and will help create a much safer IRC enviroment for you.
If you create user accounts on a server, and then allow people to log on to the ftp server under those accounts, there’s a chance that some hacker could find a way out of the chroot jail. That would allow him to access areas of the file system where he has no authorization, and possibly to plant Trojans or other malicious programs.
When you’re playing with alpha versions of Ubuntu and you accidentally delete your kernel, don’t fret and think to yourself about backing up your data and reinstalling. Get in there and fix it with a chroot command.
When reading a 'hint' on the website of LinuxFromScratch I discovered the special capabilities of unionfs, specially in combination with chroot. Later I read a HowTo on a wikiwebsite of Gentoo, about entering a chrooted homedirectory when using a special script as shell. Combining these two brings me to using a chrooted environment, which you enter when logging in as a special user
This tutorial shows how to prepare an Ubuntu 13.04 (Raring Ringtail) server (with nginx, BIND, Dovecot) for the installation of ISPConfig 3, and how to install ISPConfig 3.