summaryrefslogtreecommitdiffstats
path: root/RBASH
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 15:38:56 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 15:38:56 +0000
commit6c20c8ed2cb9ab69a1a57ccb2b9b79969a808321 (patch)
treef63ce19d57fad3ac4a15bc26dbfbfa2b834111b5 /RBASH
parentInitial commit. (diff)
downloadbash-6c20c8ed2cb9ab69a1a57ccb2b9b79969a808321.tar.xz
bash-6c20c8ed2cb9ab69a1a57ccb2b9b79969a808321.zip
Adding upstream version 5.2.15.upstream/5.2.15upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r--RBASH52
1 files changed, 52 insertions, 0 deletions
diff --git a/RBASH b/RBASH
new file mode 100644
index 0000000..7d0a5e8
--- /dev/null
+++ b/RBASH
@@ -0,0 +1,52 @@
+6.10 The Restricted Shell
+=========================
+
+If Bash is started with the name 'rbash', or the '--restricted' or '-r'
+option is supplied at invocation, the shell becomes restricted. A
+restricted shell is used to set up an environment more controlled than
+the standard shell. A restricted shell behaves identically to 'bash'
+with the exception that the following are disallowed or not performed:
+
+ * Changing directories with the 'cd' builtin.
+ * Setting or unsetting the values of the 'SHELL', 'PATH', 'HISTFILE',
+ 'ENV', or 'BASH_ENV' variables.
+ * Specifying command names containing slashes.
+ * Specifying a filename containing a slash as an argument to the '.'
+ builtin command.
+ * Specifying a filename containing a slash as an argument to the
+ 'history' builtin command.
+ * Specifying a filename containing a slash as an argument to the '-p'
+ option to the 'hash' builtin command.
+ * Importing function definitions from the shell environment at
+ startup.
+ * Parsing the value of 'SHELLOPTS' from the shell environment at
+ startup.
+ * Redirecting output using the '>', '>|', '<>', '>&', '&>', and '>>'
+ redirection operators.
+ * Using the 'exec' builtin to replace the shell with another command.
+ * Adding or deleting builtin commands with the '-f' and '-d' options
+ to the 'enable' builtin.
+ * Using the 'enable' builtin command to enable disabled shell
+ builtins.
+ * Specifying the '-p' option to the 'command' builtin.
+ * Turning off restricted mode with 'set +r' or 'shopt -u
+ restricted_shell'.
+
+These restrictions are enforced after any startup files are read.
+
+When a command that is found to be a shell script is executed (*note
+Shell Scripts::), 'rbash' turns off any restrictions in the shell
+spawned to execute the script.
+
+The restricted shell mode is only one component of a useful restricted
+environment. It should be accompanied by setting 'PATH' to a value that
+allows execution of only a few verified commands (commands that allow
+shell escapes are particularly vulnerable), changing the current
+directory to a non-writable directory other than '$HOME' after login,
+not allowing the restricted shell to execute shell scripts, and cleaning
+the environment of variables that cause some commands to modify their
+behavior (e.g., 'VISUAL' or 'PAGER').
+
+Modern systems provide more secure ways to implement a restricted
+environment, such as 'jails', 'zones', or 'containers'.
+