Alaya is based on WebDAV to support an original chrooting http://www.aliyun.com/zixun/aggregation/17117.html ">web server. It can provide HTTPS and HTTP services, and can be authenticated using PAM,/ETC/SHADOW,/ETC/PASSWD, or use its own authentication files, allowing "native" users to access only Alaya content. This is an easy way to share content for WebDAV, although it can be configured in one configuration file, but it only needs to use one command line to switch the configuration.
Alaya has been using chroots to ensure that malicious users cannot use the "..." URL to access illegal files, and that users may inadvertently leave files outside the chroot environment. It has a "chhome" mode where chroots will get the contents of its home directory Users and Services. It supports trusted paths for CGI scripts and directories other than read-only shares in Chroot (when access to shared content Chhome mode is allowed).
Alaya is a Web server that provides WebDAV support, supports HTTPS and HTTP, supports authentication through PAM, etc, passwd, and can also be authenticated with a file of its own definition.
Alaya Webdav Server 0.0.3 This version further fixes some errors. You can now compile and run under Mac OS X.
What is chrooting?
The directive chroot is the abbreviation for "Change Root", designed for the exchange itself root (root) system environment. It is the relative/(root directory) that changes. For example, the path of a file is actually/home/wuming/hello.txt in an existing system. I am now chroot/home/wuming the directory, then the path of this file in my chrooted environment is/hello.txt
The Chroot itself aims to create an impermeable (theoretically) "prison-style" protective layer. Do not allow access to any other file data in chroot environments. For example, under the Chroot/home/wuming directory, I will not be able to access any files other than/home/wuming. In general, it is restricted to users accessing system files in a multiuser system. Chroot can also be used to limit the various types of background programs, thus avoiding hacker intrusion opportunities. Or it makes it more difficult for intruders to get root privileges. For example, the system uses a vulnerable remote service, if hacked to get the shell, but the shell is not included in its own system, thus preventing hackers access to other system files. Although many people claim to be able to break through the chroot jail, most of the time they break through a shell. There is no such problem in the example we are discussing, so it is very difficult to break the daemon environment.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.