{"id":586,"date":"2011-12-13T01:01:49","date_gmt":"2011-12-13T09:01:49","guid":{"rendered":"http:\/\/blog.portnumber53.com\/?p=586"},"modified":"2011-12-13T01:01:49","modified_gmt":"2011-12-13T09:01:49","slug":"vps-noexec-and-tmp-troubleshooting","status":"publish","type":"post","link":"https:\/\/blog.portnumber53.com\/index.php\/2011\/12\/13\/vps-noexec-and-tmp-troubleshooting\/","title":{"rendered":"(vps): Noexec and \/tmp troubleshooting"},"content":{"rendered":"<h2>Chrooted \/tmp directory<\/h2>\n<p>There is also a new method that ensures that no processes currently accessing \/tmp are interrupted in any way. This also ensures that your \/tmp that allows execution is never accessible to currently running processes. This limits your exposure to possible exploits.<\/p>\n<p>First, create a chrooted environment that contains a tmp directory that allows file execution:<\/p>\n<pre>root@vps01:~# mkdir -p \/root\/chroot \/root\/tmp\nroot@vps01:~# mount --bind \/ \/root\/chroot\nroot@vps01:~# mount --bind \/root\/tmp \/root\/chroot\/tmp\nroot@vps01:~#<\/pre>\n<p>Next chroot into the environment you created.<\/p>\n<pre>root@vps01:~# chroot \/root\/chroot\nroot@vps01:\/#<\/pre>\n<p>At this point, you are in the chrooted environment and can run any commands you need to. When you are done, simply type the command &#8216;exit&#8217;.<\/p>\n<pre>root@vps01:\/# exit\nexit\nroot@vps01:~#<\/pre>\n<p>Now you are back to your normal environment.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chrooted \/tmp directory There is also a new method that ensures that no processes currently accessing \/tmp are interrupted in any way. This also ensures that your \/tmp that allows execution is never accessible to currently running processes. This limits your exposure to possible exploits. First, create a chrooted environment&#8230; <a class=\"continue-reading-link\" href=\"https:\/\/blog.portnumber53.com\/index.php\/2011\/12\/13\/vps-noexec-and-tmp-troubleshooting\/\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,14,15],"tags":[],"class_list":["post-586","post","type-post","status-publish","format-standard","hentry","category-hosting","category-linux","category-mediatemple"],"_links":{"self":[{"href":"https:\/\/blog.portnumber53.com\/index.php\/wp-json\/wp\/v2\/posts\/586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.portnumber53.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.portnumber53.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.portnumber53.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.portnumber53.com\/index.php\/wp-json\/wp\/v2\/comments?post=586"}],"version-history":[{"count":0,"href":"https:\/\/blog.portnumber53.com\/index.php\/wp-json\/wp\/v2\/posts\/586\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.portnumber53.com\/index.php\/wp-json\/wp\/v2\/media?parent=586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.portnumber53.com\/index.php\/wp-json\/wp\/v2\/categories?post=586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.portnumber53.com\/index.php\/wp-json\/wp\/v2\/tags?post=586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}