X-Recipient: archive-cygwin AT delorie DOT com X-SWARE-Spam-Status: No, hits=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE X-Spam-Check-By: sourceware.org Date: Thu, 1 Apr 2010 22:19:15 +0200 From: d DOT sastre DOT medina AT gmail DOT com To: Subject: How to properly set up a chrooted environment Message-ID: <20100401201915.GA3964@ghost.local.lan> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="FL5UXtIhxfXey3p5" Content-Disposition: inline User-Agent: Mutt/1.5.20 (2009-06-14) X-IsSubscribed: yes Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner AT cygwin DOT com Mail-Followup-To: cygwin AT cygwin DOT com Delivered-To: mailing list cygwin AT cygwin DOT com --FL5UXtIhxfXey3p5 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hello, I'm trying to build a chrooted env in a windows 7 box: CYGWIN_NT-6.1 win7 1.7.2(0.225/5/3) 2010-03-24 21:12 i686 Cygwin Before presuming anything, I did my homework, RTFM (found nothing,=20 though), STFW and STFCPMLA. Got some recent hits: [1] http://sourceware.org/ml/cygwin/2009-10/msg00476.html [2] http://sourceware.org/ml/cygwin/2009-10/msg00198.html With this in mind, my questions are: -has this situation changed/evolved in/with 1.7.2 ? -what is the basic infraestructure needed for a sane env? -what about mount points? i.e, I have this: normal_user AT box ~ $ mount E:/bin on /usr/bin type ntfs (binary,auto) E:/lib on /usr/lib type ntfs (binary,auto) E: on / type ntfs (binary,auto) H: on /chroot type ntfs (binary) I: on /usr/local type ntfs (binary) C: on /mnt/c type ntfs (binary,posix=3D0,user,noumount,auto) D: on /mnt/d type ntfs (binary,posix=3D0,user,noumount,auto) F: on /mnt/f type ntfs (binary,posix=3D0,user,noumount,auto) and I want to create a chrooted env under /chroot. Should I create a /chroot/etc/fstab (would it be ever read) in a way that chrooted_user=20 gets something like: chrooted_user AT box ~ $ mount H:/chroot / type ntfs (binary,auto) H:/chroot/bin on /usr/bin type ntfs (binary,auto) H:/chroot/lib on /usr/lib type ntfs (binary,auto) ...or a better approach would be creating a /etc/fstab.d/chrooted_user with those definitions? -is there a canonical way to do this? (and where is the manual :-)) Any feedback will be appreciated. Regards. --=20 Huella de clave =3D 943C D77F 0CB0 02FE 166E E06F D13A A2E1 98A5 C953 --FL5UXtIhxfXey3p5 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAku0/8MACgkQ0Tqi4ZilyVNgjQCfR02zArfOAH07UKukon8mYdiz emYAnRwo8WKdeWjdiZeMs84i1QG+H8JY =j7HF -----END PGP SIGNATURE----- --FL5UXtIhxfXey3p5--