Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: version B 2.10.1 6/24/83; site mordor.UUCP Path: utzoo!watmath!clyde!burl!mgnetp!ihnp4!zehntel!dual!mordor!jdb From: jdb@mordor.UUCP (John Bruner) Newsgroups: net.unix-wizards Subject: Re: Is the restricted shell really secure? Message-ID: <5147@mordor.UUCP> Date: Fri, 3-Aug-84 11:37:54 EDT Article-I.D.: mordor.5147 Posted: Fri Aug 3 11:37:54 1984 Date-Received: Sun, 5-Aug-84 05:22:02 EDT References: <275@pcsbst.UUCP> <990@inuxc.UUCP> <280@genrad.UUCP> <210@ncoast.UUCP> Organization: S-1 Project, LLNL Lines: 12 You should be able to keep a restricted account from wandering afield via ".." by making the parent directory non-executable. I.e. make the home directory for the restricted account "foo" be "/mnt/locked/foo" (replace "/mnt" with whatever top-level directory you plan to use) where "/mnt/locked" is owned by root and is mode 700. This assumes, of course, that the restricted account isn't running under user-id 0 :-) -- John Bruner (S-1 Project, Lawrence Livermore National Laboratory) MILNET: jdb@mordor.ARPA [jdb@s1-c] (415) 422-0758 UUCP: ...!ucbvax!dual!mordor!jdb ...!decvax!decwrl!mordor!jdb