Robert W. grabbed a keyboard and wrote:

> On Tue, 2003-08-19 at 21:05, David Guntner wrote:
> > Jack Coates grabbed a keyboard and wrote:
> > >
> > > On Mon, 2003-08-18 at 22:47, David Guntner wrote:
> > > > I have a user login name that is used to run a game server process
> > > > (Neverwinter Nights, if it matters :).
> > > > 
> > > > I don't know if it's possible for a remote user to crash the game process
> > > > in a way which would leave them sitting in a shell, but since I don't know
> > > > that the chances are 0%, I'm thinking that having the login name chroot
> > > > jailed to its home directory would limit the damage that someone could do
> > > > if they *did* somehow manage to end up in a shell via a server process
> > > > crash.
> > > > 
> > > > Is there a way to to this?
> > > 
> > > Look at the user's line in /etc/password. At the end is the shell
> > > they'll be given. chroot them there.
> <snip...>
> 
> What about changing the shell to "/bin/false". Will that prevent them
> getting a login shell? 

If I can't login as the player set up to run the server, it will be kind of 
hard to start up screen and then start the actual server program.... :-)

             --Dave
-- 
      David Guntner      GEnie: Just say NO!
 http://www.akaMail.com/pgpkey/davidg or key server
                 for PGP Public key


Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to