This article focuses on configuration records, and the benefits of chroot (jail) do not repeat. This article is divided into three parts: Configuring the basic chroot jail,nginx configuration chroot jail,tomcat configuration Chrootjail. 1. Configure the basic chroot jail1.1. Create a directory as the root of the chroot jail. # mkdir/home/chroot/jail1.2. Use the LDD command to find the dependent libraries of the commands you want to run in chroot jail. # ldd/bin/bashlinux-vdso.so.1 = (0x00007fff56fcc000) libtinfo.so.5 =/lib64/libtinfo.so.5 (0x0000003ad1200000 ) libdl.so.2 =/lib64/libdl.so.2 (0x0000003abe600000) libc.so.6 =/lib64/l
1. Nginx and Tomcat use Chroot (jail) related configuration
Introduction:: This article mainly introduces Nginx and Tomcat use Chroot (jail) related configuration, for PHP tutorial interested students can refer to.
2. PHP Download System The PHP Security configuration method described in the wooden-wing download system
Introduction: PHP Download system: PHP download system wood-wing download system described in the PHP Security configuration method: A, Web server security PHP is actually a Web server module function, so the first to ensure the security of the Web server. Of course, the Web server to be secure and must be first to ensure that the system security, so far away, endless. PHP can be combined with a variety of Web servers, and this is just about Apache. It is highly recommended to install boot Apache in chroot mode, so that even if Apache and PHP and their scripts are compromised, only the system that is affected will not compromise the actual system. But using Chroot's APAC
3. http://www.kaqima.com/index.ht PHP Security Configuration
Introduction: http://www.kaqima.com/index.ht:http://www.kaqima.com/index.ht PHP Security Configuration: PHP Security Configuration One, Web server security PHP is really just a module function of Web server , so the security of the Web server should be ensured first. Of course, the Web server to be secure and must be first to ensure that the system security, so far away, endless. PHP can be combined with a variety of Web servers, and this is just about Apache. It is highly recommended to install boot Apache in chroot mode, so that even if Apache and PHP and their scripts are vulnerable, only this
4. PHP-FPM chroot Implementation Environment detailed, Php-fpmchroot detailed _php tutorial
Introduction: PHP-FPM chroot Execution Environment detailed, Php-fpmchroot detailed. PHP-FPM chroot Implementation of environmental details, Php-fpmchroot detailed in php-fpm set up chroot, has a good isolation role, improve system security, but want to establish a reasonable php-fpm Chr
5. Learn about the security protection of Apache server with examples
Introduction: PHP Tutorials
6. Establishment of PHP-FPM chroot execution Environment
Introduction: Establishing a PHP-FPM chroot execution environment
7. PHP Insurance Configuration
Introduction: PHP Security Configuration One, Web server security PHP is actually a Web server module function, so the first to ensure the security of the Web server. Of course, the Web server to be secure and must be first to ensure that the system security, so far away, endless. PHP can be combined with a variety of Web servers, and this is just about Apache. It is highly recommended to install boot Apache in chroot mode, so that even if Apache and PHP and their scripts are vulnerable, the affected
8. PHP needs to disable the function
Description: PHP needs to disable the function Disable_functions =gzinflate,passthru,exec,system,chroot,scandir,chgrp,chown,shell_exec,proc_open, Proc_get_status,ini_alter,ini_alter,ini_restore,dl,pfsockopen,ope
9. PHP needs to disable the function
Description: PHP needs to disable the function Disable_functions =gzinflate,passthru,exec,system,chroot,scandir,chgrp,chown,shell_exec,proc_open, Proc_get_status,ini_alter,ini_alter,ini_restore,dl,pfsockopen,ope
PHP Insurance Configuration
Introduction: PHP Security Configuration One, Web server security PHP is actually a Web server module function, so the first to ensure the security of the Web server. Of course, the Web server to be secure and must be first to ensure that the system security, so far away, endless. PHP can be combined with a variety of Web servers, and this is just about Apache. It is highly recommended to install boot Apache in chroot mode, so that even if Apache and PHP and their scripts are vulnerable, only the affected
"Related question and answer recommendation":
Java-zookeeper Client Namespace (Chroot) does not take effect, how to solve?
No information in the Linux-grub configuration file
Linux-vsftpd:refusing to run with writable root inside Chroot ()
Java-ee-linux (Gentoo) under Java call Audiosystem.getmixerinfo () nothing comes back.
The construction of Linux-centos group