有什么方法可以 chroot linux 文件管理器吗?
只是想知道像 xfe、rox、nautilus 这样的文件管理器是否可以在 chroot 的情况下运行(在启动时),也就是无法从树上下来。
如果有人知道如何做到这一点,我会很感兴趣;它适用于网络咖啡,我不希望人们访问其他目录。
(除了使用linux fs权限之外的解决方案)。
Just wondering for an idea if it would be possible for a filemanager like xfe, rox, nautilus to be able to run (at launch) with chroot aka not being able to go down the tree.
I would be interested if anyone has an idea on how to do so; it's for a cybercoffe where I don't want people to access other directories.
(solution except using linux fs permission).
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
您的文件管理器将需要查看和访问您试图隐藏的特殊文件(例如 /proc 内容和 /dev 内容)才能正常工作。
所以,是的,您可以在 chroot 中运行文件管理器,但您需要将 /dev/ 和 /proc (的最小版本)放入 chroot 中才能使其工作。
我要么破解文件管理器的源代码以隐藏您想要的内容,要么一路在虚拟机中运行文件管理器,这样最终用户就不会损坏真正的计算资源。 qemu/kvm 非常适合这一点。
Your file manager will need to see and access of the special files you are trying to hide (such as /proc content and /dev content) in order to work properly.
So yes, you can run a file manager in a chroot, but you need to put (a minimal version of) /dev/ and /proc in the chroot for it to work.
I would either hack the source of the file manager to hide what you want or go all the way and run the file manager in a virtual machine so no damage can be done by end user to real computing resources. qemu/kvm is excellent for that.
使用权限有什么问题?登录时生成临时用户,仅授予他们对其主目录的写访问权限。任何试图破解您的系统的人都不会遇到任何障碍,可以绕过您设置的任何障碍。无论如何,他们可能会首先启动 xterm。此外,通过默默无闻实现安全则不然。
What's wrong with using permissions? Generate a temp user on login, give them write access only to their homedir. Anyone who would try to hack your system is not going to have trouble getting around whatever roadblocks you have in place. THey'd probably start by firing up an xterm anyway. Besides, security through obscurity isn't.