The easy way around this problem is to use /etc/skel. Copy /home/ftp/*
to /etc/skel. That way, when a user is created, they will have /bin,
/lib, and /etc directories. When they log into the chrooted environment,
they will have what they need to operate.

FYI,
Kenny

Ken Ambrose wrote:
> 
> And, just FYI, the reason that you were getting the chroot error is 'cause
> of the way that chroot works -- once you changed root with
> chroot /www
> chroot then goes to execute your $SHELL (or /bin/sh, failing $SHELL being
> defined)... however, shince /bin/sh is no longer accessible (after all,
> your root is now /www -- unless you've got sh in /www/bin/sh, it won't be
> accessible any more), you bomb out with the error you got.  chroot is a
> powerful, but tricky, command -- probably best to stick with the FTP docs
> which will do it for you, when tweaked properly (as someone else's e-mail
> pointed out).
> 
> -Ken
> 
> On Tue, 24 Oct 2000, Kurth Bemis wrote:
> 
> > i'm looking at making it so that when ppl loginto FTP with thier usernames
> > and passwords they are put in a "false root"  thus deniying them access to
> > the filesystem.....one problem.... look
> >
> > chroot: too few arguments
> > Try `chroot --help' for more information.
> > usa:root[/bin]$ chroot /www
> > chroot: cannot execute /bin/sh: No such file or directory
> > usa:root[/bin]$ ls
> > ae             csh            encrypt        kill           mt
> > rmdir          stty           vdir
> > arch           date           false          ln             mv
> > run-parts      su             vi
> > ash            dd             fdflush        loadkeys       netstat
> > sash           sync           virtfs
> > bash           df             fgrep          login          pidof
> > screen         tar            zcat
> > cat            dir            ftpaccess      ls             pine
> > screen-3.9.5   tcsh
> > chgrp          dmesg          fuser          mkdir          ping
> > secure-su      tempfile
> > chmod          dnsdomainname  grep           mknod          ps
> > sed            true
> > chown          echo           gunzip         mktemp         pwd
> > setserial      umount
> > cp             ed             gzip           more           rbash
> > sh             uname
> > cpio           egrep          hostname       mount          rm
> > sleep          uncompress
> > usa:root[/bin]$
> >
> > hrm......never had this problem until i started using .debs!
> >
> > any ideas?
> >
> > ~kurth
> > Kurth Bemis - Network/Systems Administrator, USAExpress.net/Ozone Computer
> >
> > There is no sin except stupidity. -- Oscar Wilde
> >
> > [EMAIL PROTECTED] | http://www.usaexpress.net/kurth
> > PGP key available - http://www.usaexpress.net/kurth/pgp
> >
> > Fight Weak Encryption!  Donate your wasted CPU cycles to Distributed.net
> > (http://www.distributed.net)
> >
> >
> >
> > **********************************************************
> > To unsubscribe from this list, send mail to
> > [EMAIL PROTECTED] with the following text in the
> > *body* (*not* the subject line) of the letter:
> > unsubscribe gnhlug
> > **********************************************************
> >
> >
> 
> **********************************************************
> To unsubscribe from this list, send mail to
> [EMAIL PROTECTED] with the following text in the
> *body* (*not* the subject line) of the letter:
> unsubscribe gnhlug
> **********************************************************

**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to