Re: chroot-ing users coming in via SSH and/or SFTP?

看板FB_security作者時間21年前 (2004/12/21 05:28), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/9 (看更多)
--FCuugMFkClbJLl1L Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hello, On Mon, Dec 20, 2004 at 02:23:02PM -0700 or thereabouts, Brett Glass wrote: > The users depositing files on the server shouldn't be allowed to see what > one another are doing or to grope around on the system, so it'd be a good > idea to chroot them into home directories, as is commonly done with FTP. >=20 > However, OpenSSH (or at least FreeBSD's version of it) doesn't seem to ha= ve a > mechanism that allows users doing SSH, SCP, or SFTP to be chroot-ed into = a=20 > specific directory. What is the most effective and elegant way to do this= ? I've=20 > seen some crude patches that allow you to put a /. in the home directory = specified > in /etc/passwd, but these are specific to versions of the "portable" Open= SSH > and none of the diffs seem to match FreeBSD's files exactly.=20 go for /usr/ports/shells/scponly, it also has ability to use chroot. Cheers, Martin --=20 martin hudec * 421 907 303 393 * corwin@aeternal.net * http://www.aeternal.net "Nothing travels faster than the speed of light with the possible=20 exception of bad news, which obeys its own special laws." Douglas Adams, "The Hitchhiker's Guide to the Galaxy" --FCuugMFkClbJLl1L Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (FreeBSD) iD8DBQFBx0OuZYEZIv+rgggRAuaTAJ0eAh9wMsjGyt6alDraKN33mT41HwCeNSXH 3fKPFHtUUX6dEHi2pOQa2fw= =s0oL -----END PGP SIGNATURE----- --FCuugMFkClbJLl1L--
文章代碼(AID): #11nqGJ00 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #11nqGJ00 (FB_security)