chroot
- 网络改变根目录;根目录;目录
-
And chroot doesn 't change the network access .
而且chroot不会改变网络访问。
-
The system call chroot () has a number of problems , as noted above .
chroot()系统调用有很多问题,如前所述。
-
One useful tool that unfortunately is a little hard to use is the chroot () system call .
chroot()系统调用是一个实用的工具&不幸的是有一些难用。
-
The chroot () function changes the root directory of the current process to the specified directory .
函数的作用是:改变当前指定目录的根目录。
-
The big new feature is chroot support for sshd ( 8 ) .
一个较重大的新特性是对sshd(8)的chroot支持。
-
The permission for the / chroot directory should be as follows
chroot目录的权限应该是
-
The techniques used to generate such lightweight containers are primarily those used to generate chroot environments .
用于生成那些轻量级容器的方法与用于生成chroot环境的方法基本一样。
-
For the paranoid , xinetd also supports an option called chroot .
xinetd还支持chroot选项。
-
The fourth line turns off chroot .
第四行关闭chroot。
-
Chroot is an ideal technique to segregate the resources your service has access to from the rest of the system .
chroot可以把服务能够访问的资源与系统的其余部分分隔开。
-
This call is similar to chroot (), but strives to be both easier to use and more effective .
这个调用类似于chroot(),不过尽力更易用且更用效。
-
Confine SFTP users to their own home directories by using Chroot SSHD
使用ChrootSSHD将SFTP用户局限于其自己的主目录
-
After a chroot , all other files and directories seem to vanish .
执行chroot之后,其他所有文件和目录就看不到了。
-
Linux-VServer also uses a form of chroot to isolate the root directory for each VPS .
Linux-VServer还使用了一种chroot格式来为每个VPS隔离root目录。
-
Running as root , rsync restricts itself to the module 's directory hierarchy ( its path ) using chroot .
在作为根用户运行时,rsync通过使用chroot只访问模块的目录层次结构(路径)。
-
One shortcoming of this approach is that an ordinary chroot () can be escaped , although some privilege is needed .
这种方法的一个缺点是,可以回避普通的chroot()机制(虽然这需要某些特权)。
-
Starting with OpenSSH-5.0p1 , there has been a modification in setting up the chroot environment .
从OpenSSH-5.0p1开始,在chroot环境设置方面有一个修改。
-
A process could chroot () itself as though the root of the filesystem tree was a subdirectory of the system 's filesystem root .
进程可以对本身执行chroot(),使其文件系统树的根成为系统文件系统根的一个子目录。
-
Once you change to a new root ( hence , chroot ), files outside the root and its subdirectories are effectively nonexistent .
通过chroot设置新的根目录之后,根目录及其子目录之外的文件就相当于不存在了。
-
For SFTP to run in the chroot environment , set the Subsystem config option in the sshd_config file as follows
为了在chroot环境中运行SFTP,要在sshdconfig文件中设置Subsystem配置选项,如下所示
-
The home directory of the user " / home / jyoti " has to be created manually inside / chroot .
必须在/chroot中手工创建用户的主目录“/home/jyoti”。
-
For example , you might run an FTP service under chroot so that no one can gain access to any file save those in the new root .
例如,可以在chroot下运行FTP服务,这样任何人都无法访问新的根目录之外的文件。
-
Since the mount tree has no parent for the new root , the system cannot be tricked into entering it like it can with chroot () .
因为在挂载树中新的根目录没有父目录,所以无法像使用chroot()时那样欺骗系统,从而访问真正的文件系统根。
-
Because xCAT expects the named service not to use chroot , remove the package bind-chroot , as shown in the listing .
由于xCAT期望此命名服务不使用chroot,所以需要删除包bind-chroot,如如下的清单所示。
-
Cliuser is a special user who can execute only SONAS CLI commands and works in a chroot jail .
cliuser是一个特殊用户,只能执行SONASCLI命令,并且只能在chroot范围内使用。
-
For example , take / chroot as the chroot directory , then the sshd_config fille will be as follows
例如,假设以/chroot作为chroot目录,sshdconfig文件中的设置应该是
-
A new config option , ChrootDirectory , is included in the sshd_config file that specifies the path to chroot after authentication .
sshdconfig文件中增加了一个新的配置选项ChrootDirectory,它指定身份验证之后chroot的路径。
-
You need to create the home directory of the user in the chroot environment and the chrooted directory should be a root-owned directory .
需要在chroot环境中创建用户的主目录,chroot目录的所有者应该是根用户。
-
The difference lies in the read-only bind mounts and the use of namespaces to enhance the isolation of the chroot environment to the point that it becomes an effective container .
不同之处在于只读绑定挂载和使用名称空间增强chroot环境的隔离性,使之成为有效的容器。
-
In other words , if you use chroot to change / tmp / fake_root , all file system resources outside of / tmp / fake_root are inaccessible to the process .
换句话说,如果使用chroot把根目录改为/tmp/fakeroot,那么进程就无法访问/tmp/fakeroot之外的所有文件系统资源。