Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.1 6/24/83; site mordor.UUCP
Path: utzoo!watmath!clyde!burl!mgnetp!ihnp4!zehntel!dual!mordor!jdb
From: jdb@mordor.UUCP (John Bruner)
Newsgroups: net.unix-wizards
Subject: Re: Is the restricted shell really secure?
Message-ID: <5147@mordor.UUCP>
Date: Fri, 3-Aug-84 11:37:54 EDT
Article-I.D.: mordor.5147
Posted: Fri Aug  3 11:37:54 1984
Date-Received: Sun, 5-Aug-84 05:22:02 EDT
References: <275@pcsbst.UUCP> <990@inuxc.UUCP> <280@genrad.UUCP> <210@ncoast.UUCP>
Organization: S-1 Project, LLNL
Lines: 12

You should be able to keep a restricted account from wandering afield
via ".." by making the parent directory non-executable. I.e. make the
home directory for the restricted account "foo" be "/mnt/locked/foo"
(replace "/mnt" with whatever top-level directory you plan to use)
where "/mnt/locked" is owned by root and is mode 700.

This assumes, of course, that the restricted account isn't running
under user-id 0 :-)
-- 
  John Bruner (S-1 Project, Lawrence Livermore National Laboratory)
  MILNET: jdb@mordor.ARPA [jdb@s1-c]	(415) 422-0758
  UUCP: ...!ucbvax!dual!mordor!jdb 	...!decvax!decwrl!mordor!jdb