Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.1 6/24/83; site ncoast.UUCP
Path: utzoo!watmath!clyde!burl!ulysses!mhuxl!ihnp4!zehntel!dual!amd!decwrl!decvax!cwruecmp!atvax!ncoast!greggt
From: greggt@ncoast.UUCP (Gregg Thompson)
Newsgroups: net.unix-wizards
Subject: Re: Is the restricted shell really secure?
Message-ID: <212@ncoast.UUCP>
Date: Mon, 30-Jul-84 21:53:56 EDT
Article-I.D.: ncoast.212
Posted: Mon Jul 30 21:53:56 1984
Date-Received: Sat, 4-Aug-84 01:29:50 EDT
References: <275@pcsbst.UUCP> <990@inuxc.UUCP> <280@genrad.UUCP> <210@ncoast.UUCP>
Organization: North Coast XENIX, Cleveland
Lines: 21


	It make the chroot() call not
go back past the 'new' root area you
use the following program.
main()
{
	unlink("DIRECTORY/..");
	link("DIRECTORY/.","DIRECTORY/..");
}
	I think that is right. This
will make sure there is the right
number of links and will make '..'
point to '.'.
-- 
Gregg Thompson

{ucbvax}!decvax!cwruecmp!ncoast!greggt
{ucbvax}!decvax!cbosgd!aat!m-net!greggt
{ucbvax}!decvax!microsoft!trsvax!sneaky!greggt
{decvax}!ucbvax!dual!proper!greggt
{ucbvax}!decvax!vortex!ihnp4!wlcrjs!greggt