Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: version B 2.10.1 6/24/83; site ncoast.UUCP Path: utzoo!watmath!clyde!burl!ulysses!mhuxl!ihnp4!zehntel!dual!amd!decwrl!decvax!cwruecmp!atvax!ncoast!greggt From: greggt@ncoast.UUCP (Gregg Thompson) Newsgroups: net.unix-wizards Subject: Re: Is the restricted shell really secure? Message-ID: <212@ncoast.UUCP> Date: Mon, 30-Jul-84 21:53:56 EDT Article-I.D.: ncoast.212 Posted: Mon Jul 30 21:53:56 1984 Date-Received: Sat, 4-Aug-84 01:29:50 EDT References: <275@pcsbst.UUCP> <990@inuxc.UUCP> <280@genrad.UUCP> <210@ncoast.UUCP> Organization: North Coast XENIX, Cleveland Lines: 21 It make the chroot() call not go back past the 'new' root area you use the following program. main() { unlink("DIRECTORY/.."); link("DIRECTORY/.","DIRECTORY/.."); } I think that is right. This will make sure there is the right number of links and will make '..' point to '.'. -- Gregg Thompson {ucbvax}!decvax!cwruecmp!ncoast!greggt {ucbvax}!decvax!cbosgd!aat!m-net!greggt {ucbvax}!decvax!microsoft!trsvax!sneaky!greggt {decvax}!ucbvax!dual!proper!greggt {ucbvax}!decvax!vortex!ihnp4!wlcrjs!greggt