sftp, scponly, restricted user environments

Matthew Carpenter matt
Mon Jan 3 09:47:01 PST 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

There is a patch available to make openssh chrooted.  I found it in a
book SANS was giving away for free called "Securing Linux: A Survival
Guide for Linux Security".

I believe there is another project just for what you want to do.  Check
out "scponly" at freshmeat.


Collins Richey wrote:
| We are in the process of setting up a user environment for users of
| our local lug. Our desire is to have user accounts that do not have a
| usable shell but to allow users to upload files, create/destroy
| directories under their home directory, remove files under their home
| directory, etc. sftp is a nice, somewhat secure way of getting this to
| happen, but it allows cd to any directory under the sun. I found some
| references to the scponly shell, but we don't currently have that
| installed on the server (FC3).
|
| We will be requiring public/private key authentication ans ssh or sftp
| for any access to the server. Users will be able to maintain their own
| webpage on our server (we use Apache).
|
| Thus far I haven't found any easy way to restrict the cd command under
| sftp. Is there any way to do this without setting up a chroot jail
| (uggh! more work than I would like)?
|
| Does anyone have any suggestions or experience with this type of setup?
|

- --
Matthew Carpenter
matt at eisgr.com                          http://www.eisgr.com/

Enterprise Information Systems
* Network Server Appliances
* Security Consulting, Incident Handling & Forensics
* Network Consulting, Integration & Support
* Web Integration and E-Business
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFB2Vw4so9lqh4MragRAq1uAJ9vboPY6R+sLx0FFlir4Vzh6rLHowCcCCkp
NzE8qbcexRAtj611MLRY7M0=
=dBrD
-----END PGP SIGNATURE-----



More information about the Linux-users mailing list