Noid has not been updated for a couple of years, and does not work on newer kernels. Consider development to be on hold, with a quite small chance of being restarted.

Noid user chroot

Most Unices and Unix-like operating systems have a nice command called chroot. Most of them also deny chroot for all non-root users. The Noid user chroot patch gives Linux the ability to provide chroot for all users in a secure way.

It will only allow user chroots for processes that have never been chrooted before, to prevent them from breaking out of a jail possibly set up by root. If a non-root user chroots, the suid/sgid bits won't have any effect under the new root, which makes any chroot suid attack impossible.

User chroot example

user:~$ /usr/sbin/traceroute 127.1
traceroute to 127.1 (127.0.0.1), 30 hops max, 38 byte packets
1 localhost (127.0.0.1) 6.658 ms 0.764 ms 0.613 ms
user:~$ /usr/sbin/chroot /
user:/$ /usr/sbin/traceroute 127.1
traceroute: icmp socket: Operation not permitted
user:/$ /usr/sbin/chroot /
/usr/sbin/chroot: cannot change root directory to /: Operation not permitted
user:/$

The user chroot patch is necessary to allow non-root users to use chtrunk. It is included in the Noid package. It should work on any Linux 2.4 kernel.

Send questions, money, bug reports, success reports, patches and suggestions to the author, Jörgen Cederlöf, at jc+noid@lysator.liu.se.

Hosted at SourceForge Logo lysator