This article focuses on configuration records. the benefits of chroot (jail) are not described in detail. This article describes how to configure basic chrootjail, nginx, and tomcat. 1. configure the basic chrootjail1.1. create a directory as the root directory of chrootjail. # Mkdirhomechrootjail1.2. use the ldd command to find out the life you want to run in chrootjail... this article focuses on configuration records. the benefits of chroot (jail) are not described in detail. This article is divided into three parts: Configure basic chroot jail, nginx configure chroot jail, and tomcat configure chrootjail. 1. configure the basic chroot jail1.1. create a directory as the root directory of chroot jail. # Mkdir/home/chroot/jail1.2. run the ldd command to find the dependent database of the command you want to run in chroot jail. # Ldd/bin/bashlinux-vdso.so.1 => (0x00007fff56fcc000) libtinfo. so.5 =>/lib64/libtinfo. so.5 (0x0000003ad1200000) libdl. so.2 =>/lib64/libdl. so.2 (0x0000003abe600000) libc. so.6 =>/lib64/l
1. Configure nginx and tomcat using chroot (jail)
Introduction: This article mainly introduces the configuration of nginx and tomcat using chroot (jail). For more information about PHP tutorials, see.
2. php Security Configuration method described in the wooden wing download system
Introduction: php download system: the PHP Security Configuration method described in the wooden wing download system: 1. Web server security PHP is actually a module function of the Web server, therefore, we must first ensure the security of Web servers. Of course, to ensure the security of Web servers, you must first ensure the system security. this is a long way to go and is endless. PHP can be combined with various Web servers. here we only discuss Apache. We strongly recommend that you install and start Apache in the form of chroot. in this way, even if Apache, PHP, and their scripts are prone to vulnerabilities, only the banned system will be affected and the actual system will not be harmed. However, the chroot Apac
3. http://www.kaqima.com/index.ht PHP Security Configuration
Brief introduction: http://www.kaqima.com/index.ht:http://www.kaqima.com/index.ht PHP Security Configuration: PHP Security Configuration I. Web server security PHP is actually a module function of Web server, so first of all to ensure the security of Web server. Of course, to ensure the security of Web servers, you must first ensure the system security. this is a long way to go and is endless. PHP can be combined with various Web servers. here we only discuss Apache. We recommend that you install and start Apache as a chroot instance. in this way, even if Apache, PHP, and their scripts have vulnerabilities, only these vulnerabilities are affected.
4. PHP-FPM Chroot execution environment details, php-fpmchroot details _ PHP Tutorial
Brief introduction: PHP-FPM Chroot execution environment details, php-fpmchroot details. PHP-FPM Chroot execution environment detailed explanation, php-fpmchroot detailed explanation in the PHP-FPM set up chroot, has a good isolation effect, improve the system security, but to establish a reasonable PHP-FPM Chr
5. Learn About Apache server security protection by using an instance.
Introduction: PHP Tutorial
6. create a Chroot execution environment for the PHP-FPM
Introduction: Creating a Chroot execution environment for a PHP-FPM
7. PHP insurance configuration
Brief introduction: PHP Security Configuration 1. Web server security PHP is actually a module function of the Web server. Therefore, you must first ensure the security of the Web server. Of course, to ensure the security of Web servers, you must first ensure the system security. this is a long way to go and is endless. PHP can be combined with various Web servers. here we only discuss Apache. We recommend that you install and start Apache as chroot, so that even if Apache, PHP, and their scripts have vulnerabilities
8. php functions that need to be disabled urgently
Description: functions to be disabled in php: disable_functions = disabled, passthru, exec, system, chroot, scandir, chgrp, chown, shell_exec, proc_open, proc_get_status, ini_alter, ini_alter, ini_restore, pfsockopen, ope
9. php functions that need to be disabled urgently
Description: functions to be disabled in php: disable_functions = disabled, passthru, exec, system, chroot, scandir, chgrp, chown, shell_exec, proc_open, proc_get_status, ini_alter, ini_alter, ini_restore, pfsockopen, ope
10. PHP insurance configuration
Brief introduction: PHP Security Configuration 1. Web server security PHP is actually a module function of the Web server. Therefore, you must first ensure the security of the Web server. Of course, to ensure the security of Web servers, you must first ensure the system security. this is a long way to go and is endless. PHP can be combined with various Web servers. here we only discuss Apache. We strongly recommend that you install and start Apache as chroot, so that even if Apache, PHP, and their scripts have vulnerabilities, only
[Related Q & A recommendations ]:
The java-zookeeper client namespace (Chroot) does not take effect. how can this problem be solved?
There is no information in the configuration file of linux-Grub.
Linux-vsftpd: refusing to run with writable root inside chroot ()
Java-ee-Linux (gentoo) calls AudioSystem. getMixerInfo () and returns nothing.
Build a cluster under linux-CentOS
The above is a detailed article about the php chroot () function. For more information, see other related articles in the first PHP community!