It maybe sounds silly but, how exactly it works ?
Basically, does it work with cPanel ?
Looking that:
> SecureLVE is a new security extension of CloudLinux. It virtualizes file system for end user, making sure that user can see only its own files.
>
> Once user logs in, or if CronJob or CGI/PHP for that user is executed, SecureLVE detects that the user should be secured, and mounts (if they weren mounted yet) all necessary directories
I start testing
Shell doesn work
securelve_sh it on /etc/shells, user can ssh when not in securelve_sh
but on securelve it connects and automatically the same time it disconnets.
For example:
Also, checking with a PHP filemanager I could see anything on the disk.
Thinking that this is something like chrooted/jail environment, I hoped to see empty /etc/passwd (chrooted), no other files except the users and so on...
Maybe I did something wrong ? Or cPanel messes around and it doesn work properly ?
Basically, does it work with cPanel ?
Looking that:
> SecureLVE is a new security extension of CloudLinux. It virtualizes file system for end user, making sure that user can see only its own files.
>
> Once user logs in, or if CronJob or CGI/PHP for that user is executed, SecureLVE detects that the user should be secured, and mounts (if they weren mounted yet) all necessary directories
I start testing
Shell doesn work
securelve_sh it on /etc/shells, user can ssh when not in securelve_sh
but on securelve it connects and automatically the same time it disconnets.
For example:
Code:
May 25 02:24:02 sshd[11061]: Accepted password for xxx ssh2 May 25 02:24:02 sshd[11061]: pam_unix(sshd:session): session opened for user xxx by (uid=0) May 25 02:24:02 sshd[11061]: pam_unix(sshd:session): session closed for user xxx
Thinking that this is something like chrooted/jail environment, I hoped to see empty /etc/passwd (chrooted), no other files except the users and so on...
Maybe I did something wrong ? Or cPanel messes around and it doesn work properly ?
Comment