On Sat, May 20, 2006 at 02:14:34PM +0100, Gaby vanhegan wrote:
> On 20 May 2006, at 00:44, Stuart Henderson wrote:
> 
> > move the files under /var/www, and nfs mount to 127.0.0.1 back
> > into the homes? you probably want to look at amd for this.
> > of course the ftpd could sit on another machine if you want.
> 
> This means that I'd need an nfs mount point for each website running  
> on that machine (a lot more than 80), and also requiring the use of nfs.
> 
> > moving the whole homes under /var/www is simpler and presumably
> > more robust, of course... and hey, it's only 80.
> 
> Which defeats the object of what I'm trying to achieve; user's  
> websites (and only their websites) are inside the apache chroot, so  
> in the event of a php or apache exploit, only their websites are  
> exposed, not their entire home directory or Maildir.
> 
> Something's got to give here.  I suspect that I'm going to have to un- 
> chroot the ftp daemon.  Is there an ftpd somewhere that can prevent  
> users from looking at certain directories?  For example, I would like  
> to limit access only to /home/username and /var/www/home/username in  
> ftpd, and prevent access to places like /etc, /usr/local, and so on.

A lot of FTP daemons can do that, but I don't really see the point. The
protections they offer might or might not be circumventable, but nothing
interesting should be readable anyway.

Anyway, ISTR that ProFTPd could do that; I'm quite certain neither stock
ftpd nor vsftpd can.

                Joachim

Reply via email to