TIP: Click on subject to list as thread! ANSI
echo: wwb_sysop
to: Marc Lewis
from: Barry Blackford
date: 2005-06-20 23:20:06
subject: Hacked off

Hello there Marc!

20 Jun 05 at 00:47, Marc Lewis writes to Barry Blackford:

 ML> Though I don't run Linux, I see where some folks increase the security of
 ML> various critical servers (like DNS, SMTP, etc.) by some moderately complex
 ML> process of running them "in jail".

 ML> As I understand it, users are set up that own the various processes and
 ML> their files and are give fake root directories with the chroot command, or
 ML> some variation thereof.  An intruder cannot get past the fake root into
 ML> the actual system, or so I'm told.

 ML> Have you considered something like this?

No, but only because I'm no expert with linux, I have relied on a very good
friend to assist me with all the major configuration, this is the first I
have heard of this process... I'll mention it to him though..

Best Rgds, Bazz
barry{at}glonet.co.nz
---
* Origin: Global NetWork ARGUS IP Mailer & FTP Fidonet New Zealand (3:774/605)
SEEN-BY: 633/267 270
@PATH: 774/605 140/1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.