diff options
author | Roger Leigh <rleigh@debian.org> | 2006-10-18 19:49:04 +0000 |
---|---|---|
committer | Roger Leigh <rleigh@debian.org> | 2006-10-18 19:49:04 +0000 |
commit | a5d1aec7510e4c21e633bf18a25055567a8ce721 (patch) | |
tree | f6aee5f98567b3a214d5d65d7a2942dad16ae605 /README | |
parent | 0f4f4ab3266cc1cef7c7b58f289a8e0654036f57 (diff) | |
download | schroot-a5d1aec7510e4c21e633bf18a25055567a8ce721.tar.gz |
* README, schroot/schroot-setup.5.in, schroot/schroot.conf.5.in:
Fix a number of minor typos. Thanks to Jens Seidel.
Diffstat (limited to 'README')
-rw-r--r-- | README | 12 |
1 files changed, 6 insertions, 6 deletions
@@ -4,11 +4,11 @@ schroot Securely enter a chroot and run a command or login shell. Note that giving untrusted users root access to chroots is a serious -security risk!. Although the untrusted user will only have root -access to files inside the chroot, in practice there are many obvious -ways of breaking out of the chroot and of disrupting services on the -host system. As always, this boils down to trust. Don't give chroot -root access to users you would not trust with root access to the host +security risk! Although the untrusted user will only have root access +to files inside the chroot, in practice there are many obvious ways of +breaking out of the chroot and of disrupting services on the host +system. As always, this boils down to trust. Don't give chroot root +access to users you would not trust with root access to the host system. For compatibility with existing tools and scripts, wrapper binaries @@ -48,7 +48,7 @@ Note that the testsuite ("make check") should be run under fakeroot or real root in order to work correctly. There are the following additional options: - --enable-dchroot: Build dchroot. + --enable-dchroot: Build dchroot --enable-dchroot-dsa: Build DSA dchroot --enable-debug: Enable debugging features (not recommended) |