Robert W. grabbed a keyboard and wrote:
> On Tue, 2003-08-19 at 21:05, David Guntner wrote:
> > Jack Coates grabbed a keyboard and wrote:
> > >
> > > On Mon, 2003-08-18 at 22:47, David Guntner wrote:
> > > > I have a user login name that is used to run a game server process
> > > > (Neverwinter Nights, if it matters :).
> > > >
> > > > I don't know if it's possible for a remote user to crash the game process
> > > > in a way which would leave them sitting in a shell, but since I don't know
> > > > that the chances are 0%, I'm thinking that having the login name chroot
> > > > jailed to its home directory would limit the damage that someone could do
> > > > if they *did* somehow manage to end up in a shell via a server process
> > > > crash.
> > > >
> > > > Is there a way to to this?
> > >
> > > Look at the user's line in /etc/password. At the end is the shell
> > > they'll be given. chroot them there.
> <snip...>
>
> What about changing the shell to "/bin/false". Will that prevent them
> getting a login shell?
If I can't login as the player set up to run the server, it will be kind of
hard to start up screen and then start the actual server program.... :-)
--Dave
--
David Guntner GEnie: Just say NO!
http://www.akaMail.com/pgpkey/davidg or key server
for PGP Public key
Want to buy your Pack or Services from MandrakeSoft?
Go to http://www.mandrakestore.com