<p>Bind-mounting /dev in a chroot is woefully insecure. You don't want the host's block devices in the chroot unless you don't care. Create the needed nodes by hand in order to prevent damages. If you don't trust the users in the chroot, that is. </p>
<div class="gmail_quote">On Aug 20, 2012 6:22 PM, "Chris Fowler" <<a href="mailto:cfowler@outpostsentinel.com">cfowler@outpostsentinel.com</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
On 08/17/2012 08:31 PM, Ted W wrote:<br>
> service telnet<br>
> {<br>
> socket_type = stream<br>
> protocol = tcp<br>
> wait = no<br>
> disable = no<br>
> user = root<br>
> port = 23<br>
> server = /usr/bin/chroot<br>
> server_args = /chroot /usr/sbin/in.telnetd -h<br>
<br>
<br>
mkdir /chroot/proc<br>
mkdir /chroot/sys<br>
<br>
mount -t bind /proc /chroot/proc<br>
mount -t bind /dev /chroot/dev<br>
mount -t bind /dev/pts /chroot/dev/pts<br>
mount -t bind /sys /chroot/sys<br>
<br>
<br>
_______________________________________________<br>
Ale mailing list<br>
<a href="mailto:Ale@ale.org">Ale@ale.org</a><br>
<a href="http://mail.ale.org/mailman/listinfo/ale" target="_blank">http://mail.ale.org/mailman/listinfo/ale</a><br>
See JOBS, ANNOUNCE and SCHOOLS lists at<br>
<a href="http://mail.ale.org/mailman/listinfo" target="_blank">http://mail.ale.org/mailman/listinfo</a><br>
</blockquote></div>